Microsoft's April 2024 Patch Tuesday update addressed a substantial 149 vulnerabilities, with two zero-days, CVE-2024-26234 and CVE-2024-29988, being actively exploited in the wild. CVE-2024-26234 is a proxy driver spoofing vulnerability that allows an attacker to trick the system into loading a malicious driver, potentially leading to privilege escalation. CVE-2024-29988 is a bypass of the SmartScreen security feature, which could enable attackers to execute malicious code by evading security prompts designed to protect users. The active exploitation of these vulnerabilities elevates their risk profile significantly, requiring immediate attention from system administrators to apply the necessary patches and prevent compromise.
This vulnerability allows a malicious actor to create a file that appears to be a legitimate, signed driver. An attacker could exploit this to install a malicious driver, which would then execute with kernel-level privileges. This type of flaw is often used in post-compromise scenarios to escalate privileges and establish persistence on a system.
This vulnerability allows an attacker to craft a file that bypasses the Windows SmartScreen security feature. Normally, SmartScreen would warn a user that a downloaded file is potentially unsafe. By exploiting this flaw, an attacker can ensure that their malicious file is presented to the user without any security warnings, greatly increasing the likelihood that the user will open it and become infected.
Both CVE-2024-26234 and CVE-2024-29988 were confirmed by Microsoft to be actively exploited at the time of the patch release. The existence of functional exploit code and ongoing attacks makes these vulnerabilities a high priority for remediation. Threat actors are likely incorporating these exploits into their attack chains for initial access (via SmartScreen bypass) and privilege escalation (via driver spoofing).
No specific Indicators of Compromise (IOCs) were provided in the source articles.
Security teams may want to hunt for the following patterns which could indicate related activity:
4688regsvr32.exe /s /n /u /i:http://...Software Update technique.Applying the April 2024 security updates from Microsoft is the primary mitigation for these vulnerabilities.
Mapped D3FEND Techniques:
Use application control solutions like WDAC to prevent the loading of untrusted drivers and the execution of unauthorized code.
Educate users about the risks of downloading and running files from the internet, even if they don't see a security warning.
The immediate and most effective countermeasure is the swift application of Microsoft's April 2024 security updates. Given that both CVE-2024-26234 and CVE-2024-29988 are actively exploited, organizations must treat this as an emergency patching cycle. Use a centralized patch management system like Microsoft Endpoint Configuration Manager (MECM) or Windows Server Update Services (WSUS) to automate deployment to all Windows endpoints and servers. Prioritize patching for internet-facing systems and workstations used by high-profile users (e.g., executives, system administrators) first. Establish a compliance report to track patch deployment status and follow up on devices that fail to update. This action directly remediates the underlying code flaws, rendering the exploits ineffective and providing the most comprehensive protection.
As a powerful compensating control, implement application and driver allowlisting using a tool like Windows Defender Application Control (WDAC). This is particularly effective against CVE-2024-26234, as a properly configured WDAC policy will prevent the system from loading any unsigned or unauthorized driver, regardless of the spoofing attempt. For CVE-2024-29988, allowlisting prevents the malicious payload from running even if the user is tricked into downloading and opening it. Start by deploying WDAC in audit mode to build a baseline of legitimate applications and drivers in your environment. Gradually move to enforcement mode, beginning with more standardized systems like servers or specific user roles. While more complex to implement than patching alone, allowlisting provides a robust defense-in-depth layer against a wide range of malware and exploitation techniques, including future zero-days.
Microsoft releases its April 2024 Patch Tuesday update, addressing 149 vulnerabilities.
Microsoft updates advisories for CVE-2024-26234 and CVE-2024-29988 to reflect active exploitation.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats