January's Patch Tuesday brings 49 CVEs– here is what you should look out for

January's Patch Tuesday brings 49 CVEs– here is what you should look out for

January's Patch Tuesday brings 49 CVEs– here is what you should look out for


Happy New Year, and welcome to the first Patch Tuesday of 2024! 

In the January 2024 Patch [Fix] Tuesday podcast, we dove into two key vulnerabilities, CVE-2024-20674 - Windows Kerberos Security Feature Bypass Vulnerability and CVE-2024-20666 - BitLocker Security Feature Bypass Vulnerability.  

We also explored Operation Triangulation, a sophisticated and complex exploit chain targeting Apple devices.  

First, let's take a look to see how January 2024's Patch Tuesday stacks up. 




Windows Kerberos Security Feature Bypass Vulnerability [Critical] 

CVE-2024-20674 is a severe security vulnerability in Windows Kerberos, a network authentication protocol. With a CVSS score of 9/10, this is definitely one that should be at the top of your list.  

This flaw leverages a mechanism allowing attackers to sidestep certain security measures, potentially gaining unauthorized access to guarded information. The vulnerability is particularly worrisome as Kerberos is a widely used protocol in Windows for authenticating users on a network, making it a tempting target for malicious actors. Exploiting this flaw could lead to a wide range of adverse effects including unauthorized data access, information theft, and in severe cases, complete system compromise. 

"This is an incredibly serious flaw. It's basically giving someone the keys to your kingdom. Once inside, they can bypass a slew of security measures. It's like leaving your front door wide open with a neon sign that says 'Come on in.' That's why this patch is so vital - to slam that door shut before any damage is done. 

The intricacy of this vulnerability lies in its ability to exploit Kerberos, the default authentication protocol for Windows. An attacker could leverage this flaw to impersonate any user on the domain, essentially gaining the same network privileges as that user. This could lead to a range of devastating consequences, from data theft to further network compromise. Applying the patch is not just about addressing this individual vulnerability. It's about fortifying your overall network security against a potential cascade of breaches." - Tom Bowyer, Director IT Security, Automox 


BitLocker Security Feature Bypass Vulnerability [Important] 

Next up is CVE-2024-2222. This vulnerability has a CVSS score of 7/10. This flaw lies within BitLocker, a drive encryption technology for Windows. This vulnerability potentially permits an attacker to sidestep BitLocker's protective measures and possibly  gain unauthorized access to data that should have been securely encrypted. What makes this vulnerability particularly concerning is that BitLocker is extensively used across various Windows systems to safeguard sensitive data. An attacker exploiting this flaw could decrypt and gain unrestricted access to this information, posing serious risks 

"We're seeing a loophole in BitLocker that, if exploited, could lead to serious data breaches. It could allow someone with physical access to a corporate endpoint to  gain access to encrypted data. While the CVE scoring may not exactly reflect the severity of this flaw due to the specific conditions required for its exploitation, this is rather serious. It is also a category of breach that was once prevalent and is now largely overlooked because it is considered to be solved. 

In the world of cybersecurity, what's old is often new again. Legacy systems, old vulnerabilities, they tend to resurface, often repackaged or retooled. We see this time and time again. It's a constant reminder that you can't just focus on the latest threats. You also have to pay attention to the old ones, because they never truly go away."Jason Kikta, CISO / SVP of Product, Automox 

Operation Triangulation 

iOS and Apple Vulnerabilities 

Operation Triangulation is a sophisticated hacking method that has been gaining notoriety. It involves a series of sophisticated techniques to infiltrate deeply into systems. 

This highly sophisticated hacking methodology involves a meticulously orchestrated series of complex techniques to infiltrate iOS and other Apple operating systems. It subverts numerous layers of security protocols leaving behind no apparent traces of intrusion. 

Integral to Operation Triangulations strategy is the concept of 'fuzzing,' a sophisticated testing technique that involves inundation of a system with random data to induce crashes. It is through these crashes that vulnerabilities like buffer overflow conditions can be discovered, paving the way for more serious system exploitations.  

The research that went into this vulnerability also employed hardware hacking, which involves manipulating the physical components of a device to alter its functionalities. This allows the attacker to gain unauthorized access, or even complete control, of the targeted system. These facets combined, Operation Triangulation presents an immensely potent threat to the cybersecurity landscape. 

"Operation Triangulation is truly a testament to the level of sophistication that cyber threats can reach. This methodology doesn't just tip-toe around security protocols - it dances right through them, leaving virtually no trace behind. The incorporation of 'fuzzing' and hardware hacking techniques makes this a formidable strategy. With the evolution and standardization of Rich Communication Service (RCS) and the sheer number of devices it could potentially impact, we need to stay vigilant and proactive in our cybersecurity measures to guard against such advanced threats." - Cody Dietz, Security Engineering Team Lead, Automox 

Patch Regularly, Patch Often 

As we wrap up this first Patch Tuesday of 2024, we would like to stress the importance of vigilance and proactive measures in maintaining cybersecurity. Be it the high-severity CVE-2024-20674 in Windows Kerberos, the important CVE-2024-20666 in BitLocker, or sophisticated Operation Triangulation, each presents unique challenges that underscore the evolving landscape of cyber threats.  

Remember, keeping all software up-to-date with the latest patches is a crucial step in safeguarding against potential threats. 

Want to hear more about this? Listen to the Patch [Fix] Tuesday podcast here, or wherever you get your podcasts. 

Still looking for more? We just released our 2024 State of ITOps Report. Check it out today! 

Until next month, Patch regularly, Patch often.  


We provides a 100% CloudNative IT Endpoint operations platform for modern organizations. As a comprehensive EndPointManagement Platform, it has advanced SoftwareManagement for PatchManagement, Adding, Removing, and Updating Software, Changing and Configure Settings along with PolicyManagement on any device or operating system located anywhere in the world and at any time. With the push of a button, ITAdministartors can fix CriticalVulnerabilities faster, slash cost and complexity, and win back hours in the day.If you want to know more kindly Click here

© 2023 SRC Cyber Solutions LLP. All Rights Reserved.