{"id":55037,"date":"2024-01-11T14:33:17","date_gmt":"2024-01-11T14:33:17","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/35388\/Microsoft-Fixes-48-Bugs-In-January-Patch-Tuesday-None-Of-Them-Zero-Days.html"},"modified":"2024-01-11T14:33:17","modified_gmt":"2024-01-11T14:33:17","slug":"microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/","title":{"rendered":"Microsoft Fixes 48 Bugs In January Patch Tuesday, None Of Them Zero Days"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/01\/011024_microsoft_logo.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>Microsoft addressed 48 vulnerabilities for <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Jan\" target=\"_blank\" rel=\"noreferrer noopener\">January 2024 Patch Tuesday,<\/a> and most notably, none of the flaws were actively exploited as no zero-day vulnerabilities were published or&nbsp;patched on Jan. 9, making it the second consecutive Patch Tuesday with no zero-days.<\/p>\n<p>The most critical vulnerability was <a href=\"https:\/\/streaklinks.com\/BztTdvD1dYeV6uJAAQH8PKS5\/https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fen-US%2Fadvisory%2FCVE-2024-20674\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-20674<\/a>, which all current versions of Windows received a patch for.<\/p>\n<p>Adam Barnett, lead software engineer at Rapid 7, described the bug as a flaw in the Windows implementation of Kerberos. By establishing a machine-in-the-middle (MitM) scenario, Barnett said an attacker could trick a client into thinking it\u2019s communicating directly with the Kerberos authentication server, and subsequently bypass authentication and impersonate the client user on the network.<\/p>\n<p>\u201cAlthough exploitation requires an existing foothold on the local network, both the CVSS 3.1 base score of 9.0 and Microsoft\u2019s proprietary severity ranking of critical reflect that there\u2019s no requirement for user interaction or prior authentication,\u201d explained Barnett. \u201cMicrosoft also notes that it considers exploitation of this vulnerability more likely.\u201d<\/p>\n<p>Another critical bug security pros should focus on was <a href=\"https:\/\/streaklinks.com\/BztTdvD9_eG2Km_Anw8uayGm\/https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fen-US%2Fadvisory%2FCVE-2024-20700\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-20700<\/a>, a remote code execution vulnerability in the Windows Hyper-V hardware virtualization service.<\/p>\n<p>Barnett said Microsoft ranks this vulnerability as critical under its own proprietary severity scale. However, the CVSS 3.1 base score of 7.5 equates only to high severity, reflecting the high attack complexity \u2014 attackers must win a race condition \u2014 and the requirement for the attack to be launched from the restricted network.<\/p>\n<p>\u201cThe advisory is light on detail, so it isn\u2019t clear exactly where the attacker must be located \u2014 the LAN on which the hypervisor resides, or a virtual network created and managed by the hypervisor \u2014 or in what context the remote code execution would occur,\u201d said Barnett. \u201cHowever, since Microsoft ranks the vulnerability as more severe than the CVSS score would suggest, defenders should assume that exploitation is possible from the same subnet as the hypervisor, and that code execution will occur in a SYSTEM context on the Hyper-V host.\u201d<\/p>\n<p>Another flaw that Microsoft rated \u201cImportant\u201d with a CVSS score of 8.7 was <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-0056\">CVE-2024-0056<\/a>, a bug that lets an attacker perform a machine-in-the-middle (MITM) attack, intercepting and potentially altering transport layer security (TLS) traffic between a client and server.<\/p>\n<p>Saeed Abbasi, manager of vulnerability research at the Qualys Threat Research Unit, said if exploited, an attacker could decrypt, read or modify secure TLS traffic, breaching the confidentiality and integrity of data. Also, Abbasi said the attacker could leverage it to exploit the SQL Server through the SQL Data Provider, potentially affecting the SQL Server itself.<\/p>\n<p>\u201cThe successful exploitation of this vulnerability may not be limited to the initially compromised component,\u201d said Abbasi. \u201cNonetheless, the high complexity of the attack implies that taking advantage of this vulnerability is a complex task. If exploited, this vulnerability could result in data breaches, compromise data integrity, and lead to unauthorized access to sensitive information.\u201d<\/p>\n<p>Abbasi added that security pros should strengthening network security to make MITM attacks more complex by using secure network protocols, monitoring network traffic for anomalies, and implementing robust firewall rules.<\/p>\n<p>Other bugs security pros should focus in include a&nbsp;patch&nbsp;for Microsoft Office that disables the ability to insert 3D models from FilmBox (FBX) files into Office documents to guard against exploitation of&nbsp;<a href=\"https:\/\/streaklinks.com\/BztTdvDBATDbu4CKqwolnSeR\/https%3A%2F%2Fportal.msrc.microsoft.com%2Fen-US%2Fsecurity-guidance%2Fadvisory%2FCVE-2024-20677\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-20677<\/a>, which Microsoft describes as an arbitrary code execution.<\/p>\n<p>Rapid7\u2019s Barnett said exploitation would involve an Office user interacting with a malicious FBX file, and could lead to information disclosure or downtime. Models already present in documents will continue to function as before, unless the \u201cLink to File\u201d option was chosen upon insertion.<\/p>\n<p>In a&nbsp;<a href=\"https:\/\/streaklinks.com\/BztTdvD4eLbk508UxwMcbzVE\/https%3A%2F%2Fprod.support.services.microsoft.com%2Fen-us%2Ftopic%2Fsupport-for-fbx-files-has-been-turned-off-in-office-9f2387f1-84ec-496a-a288-2c6f774db219\" target=\"_blank\" rel=\"noreferrer noopener\">related blog post<\/a>, Microsoft recommended avoiding FBX and instead make use of the GLB 3D file format from now on. The blog post also offered instructions on a registry modification which re-enables the ability to insert FBX files into Office documents, although Microsoft strongly recommended against this. On the plus side: the Preview Pane is not a vector for CVE-2024-20677. Both the Windows and Mac editions of Office are vulnerable until&nbsp;patched.<\/p>\n<p>Barnett pointed out that SharePoint admins should take note of&nbsp;<a href=\"https:\/\/streaklinks.com\/BztTdvDZWRnd0fWVrwgZTxbq\/https%3A%2F%2Fmsrc.microsoft.com%2Fupdate-guide%2Fen-US%2Fadvisory%2FCVE-2024-21318\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2024-21318<\/a>. Successful exploitation lets an attacker with existing Site Owner permissions to execute code in the context of the SharePoint Server. Many SharePoint RCE vulnerabilities require only Site Member privileges, so the requirement for Site Owner here does provide some small comfort, but the potential remains that CVE-2024-21318 could be abused either by a malicious insider or as part of an exploit chain.<\/p>\n<p>\u201cThe advisory does mention that exploitation requires that an attacker must already be authenticated as \u2018at least a Site Owner,\u2019 although it\u2019s not clear what level of privilege above Site Owner is implicated here,\u201d said Barnett. \u201cA user with SharePoint Administrator or Microsoft 365 Global Administrator role could certainly assign themselves the Site Owner role.\u201d<\/p>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/35388\/Microsoft-Fixes-48-Bugs-In-January-Patch-Tuesday-None-Of-Them-Zero-Days.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":55038,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[5301],"class_list":["post-55037","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemicrosoftflawpatch"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Microsoft Fixes 48 Bugs In January Patch Tuesday, None Of Them Zero Days 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Fixes 48 Bugs In January Patch Tuesday, None Of Them Zero Days 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-11T14:33:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/01\/011024_microsoft_logo.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Microsoft Fixes 48 Bugs In January Patch Tuesday, None Of Them Zero Days\",\"datePublished\":\"2024-01-11T14:33:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/\"},\"wordCount\":817,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days.jpg\",\"keywords\":[\"headline,microsoft,flaw,patch\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/\",\"name\":\"Microsoft Fixes 48 Bugs In January Patch Tuesday, None Of Them Zero Days 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days.jpg\",\"datePublished\":\"2024-01-11T14:33:17+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days.jpg\",\"width\":1123,\"height\":749},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,microsoft,flaw,patch\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinemicrosoftflawpatch\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft Fixes 48 Bugs In January Patch Tuesday, None Of Them Zero Days\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Microsoft Fixes 48 Bugs In January Patch Tuesday, None Of Them Zero Days 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/","og_locale":"en_US","og_type":"article","og_title":"Microsoft Fixes 48 Bugs In January Patch Tuesday, None Of Them Zero Days 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-01-11T14:33:17+00:00","og_image":[{"url":"https:\/\/files.scmagazine.com\/wp-content\/uploads\/2024\/01\/011024_microsoft_logo.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Microsoft Fixes 48 Bugs In January Patch Tuesday, None Of Them Zero Days","datePublished":"2024-01-11T14:33:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/"},"wordCount":817,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days.jpg","keywords":["headline,microsoft,flaw,patch"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/","url":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/","name":"Microsoft Fixes 48 Bugs In January Patch Tuesday, None Of Them Zero Days 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days.jpg","datePublished":"2024-01-11T14:33:17+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2024\/01\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days.jpg","width":1123,"height":749},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/microsoft-fixes-48-bugs-in-january-patch-tuesday-none-of-them-zero-days\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,microsoft,flaw,patch","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemicrosoftflawpatch\/"},{"@type":"ListItem","position":3,"name":"Microsoft Fixes 48 Bugs In January Patch Tuesday, None Of Them Zero Days"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=55037"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/55037\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/55038"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=55037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=55037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=55037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}