Microsoft says it broke some Windows 10 patching – as it fixes flaws under attack

Patch Tuesday Another Patch Tuesday has dawned, as usual with the unpleasant news that there are pressing security weaknesses and blunders to address.

Microsoft issued fixes for more than 70 flaws affecting various components of its products including Windows, Office and its Mark of the Web mechanism, Azure, Dynamics Business Central, SQL Server, Hyper-V, and Remote Desktop Licensing Service.

Three are already being exploited in the wild. Here they are in descending order of severity:

  • CVE-2024-38014 – A CVSS 7.8-out-of-10 in CVSS severity issue allowing privilege escalation in Windows Installer that could give full SYSTEM privileges. It was discovered by the SEC Consult Vulnerability Lab.
  • CVE-2024-38226 – A CVSS 7.4 security bypass hole in Publisher 2016, plus Office 2019 and 2021. This does require a victim to open a poisoned file, but once that’s done the attacker can bypass the macro defenses in Office.
  • CVE-2024-38217 – A CVSS 5.4 issue allowing a miscreant to bypass Microsoft’s Mark of the Web software identification engine. There’s a second Mark of the Web flaw addressed this month – CVE-2024-43487 – which Microsoft lists as likely to be exploited and of moderate concern.

Then there’s CVE-2024-43491, a car crash that solely affects Windows 10 version 1507 first released in July 2015. While that version fell out of support in 2017 for its Pro, Home, Enterprise, Education, and Enterprise IoT editions, Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 remain in support; all are affected.

This bug is rated 9.8-out-of-10 in CVSS severity as, from what we can tell, it caused the operating system to silently undo previously applied updates and security patches for certain optional components, leaving them open to attack and other issues.

This is due to a programming error triggered by applying security updates released between March and August 2024 inclusively, we’re told.

It appears that if you install a security update issued between those two months on Windows 10 version 1507, and then apply updates or security patches released since March 12, the OS gets mighty confused and reverts the updated software back to its base RTM – release to manufacturing – version, leaving the code unpatched and the computer at risk of attack. According to Microsoft, this rollback can happen to the following optional components:

  • .NET Framework 4.6 Advanced Services ASP.NET 4.6
  • Active Directory Lightweight Directory Services
  • Administrative Tools
  • Internet Explorer 11
  • Internet Information ServicesWorld Wide Web Services
  • LPD Print Service
  • Microsoft Message Queue (MSMQ) Server Core
  • MSMQ HTTP Support
  • MultiPoint Connector
  • SMB 1.0/CIFS File Sharing Support
  • Windows Fax and Scan
  • Windows Media Player
  • Work Folders Client
  • XPS Viewer

Microsoft is treating this as an exploited-in-the-wild bug in that it previously issued patches for actively exploited bugs for those components, and these patches would have been removed by the bug.

“Starting with the Windows security update released March 12, 2024 – KB5035858 (OS Build 10240.20526), the build version numbers crossed into a range that triggered a code defect in the Windows 10 (version 1507) servicing stack that handles the applicability of optional components,” as Microsoft so clearly put it.

“As a result, any optional component that was serviced with updates released since March 12, 2024 (KB5035858) was detected as ‘not applicable’ by the servicing stack and was reverted to its RTM version.”

So does that mean if you applied, say, the March 2024 update, the operating system already undid fixes previously applied? Yes: “If you have installed any of the previous security updates released between March and August 2024, the rollbacks of the fixes for CVEs affecting [the] optional components have already occurred. To restore these fixes customers need to install the September 2024 Servicing Stack Update and Security Update for Windows 10.”

Indeed, Microsoft says people should install both the servicing stack update KB5043936 and security update KB5043083, released this Patch Tuesday, in that order “to be fully protected from the vulnerabilities that this CVE rolled back.” Users automatically applying updates will have got this already.

There are more details here, which does warn that this may break dual-boot systems that run Windows and Linux, and you’re told to check out a workaround for that.

Moving on…

Here are the other bugs addressed by Microsoft this week.

Azure accounts for plenty of the worst bugs, including three elevation of privilege flaws (CVE-2024-38216, CVE-2024-38220, and CVE-2024-38194, all critical) in the Stack Hub that’s used to run Microsoft’s platform on-prem and Azure Web Apps.

Azure’s Network Watcher VM Agent has a pair of similar escalations bugs (CVE-2024-38188 and CVE-2024-43470, both important) and a remote code issue (CVE-2024-43469, also important) in the platform’s CycleCloud HPC orchestrator.

SharePoint Server has two critical flaws, CVE-2024-38018 and CVE-2024-43464, allowing attackers with Site Member and Site Owner permissions to execute code remotely. There are 30 elevation of privilege flaws to choose from in this month’s update that could be chained with these two flaws and Microsoft lists both critical flaws as “Exploitation more likely.”

Another critical flaw, CVE-2024-38119, stems from a use-after-free remote code execution bug in the Windows Network Address Translation (NAT) code base. An attacker would have to be inside the network already to abuse this and Microsoft lists it as difficult to use and less likely to be exploited.

Users of Windows 11 version 21H2 or 22H2 should also remember that next patch Tuesday, October 8, will see support for their operating systems coming to an end for Home, Pro, Pro Education, and Pro for Workstations. If you’re using automatic updates you’ll be prompted to upgrade next month.

Adobe’s low-priority patches

Patch Tuesday is not just Microsoft’s party: Adobe has revealed 19 critical issues, 13 important, and three rated as moderate severity. ColdFusion 2021 and 2023 are vulnerable to a CVSS 9.8 issue over using deserialization of untrusted data that would allow arbitrary code access.

Adobe has also popped patches for the Windows and macOS versions of Photoshop, Acrobat and Reader, Illustrator, After Effects, Premiere Pro, ColdFusion, Media Encoder, and Audition.

Adobe classified all of them as Priority 3, its lowest ranking and reports that there are no exploits in the wild.

Intel suggests killing its RAID Web Console

After releasing 43 security advisories in August Intel delivered just four this month –only one of which is high severity.

But one of those advisories addresses 11 CVEs related to “Potential security vulnerabilities in UEFI firmware [that] may allow escalation of privilege, denial of service or information disclosure.”

The CVES cover a very extensive list of older mobile, PC and server chips, including Atom, 13th generation and earlier Core processors, and Xeon E5 v3 and prior platforms.

A patch is also out for CVE-2024-24968, which would allow a denial of service attacks against the 13th generation of Intel Core processors (and earlier kit) in mobile, desktop and embedded hardware. Xeon D server chips and 3rd-gen scalable systems are also vulnerable.

Intel’s Running Average Power Limit interface is vulnerable to CVE-2024-23984, the chipmaker warns, which would allow information disclosure, although only for a privileged user. The issue affects third-generation Xeon D and scalable chips and servers, workstations, and embedded systems.

There’s also a warning that all RAID Web Console software is vulnerable to nine CVEs but Intel won’t be issuing fixes since the product went end of life in March. Customers are advised to stop using the software and delete it from their systems.

SAP fixes, then fixes again

SAP has issued 19 security notes detailing 16 new patches and three updates to older fixes.

All the new security patches are medium severity or less with CVSS scores of six or below.

SAP has given the highest priority to fixing earlier issues. Top of its list is CVE-2024-41730, in the BusinessObjects Business Intelligence Platform which has a CVSS score of 9.8, is rated highest by SAP, and was issued last month. The new code extends cover to Release 420 of the Enterprise software component and includes details for a workaround for those that can’t patch yet.

SAP’s only high priority note covers CVE-2024-33003, an information disclosure vuln in the Commerce Cloud platform with a CVSS of 7.4 that was also released in August. The latest software extends vulnerability coverage to Release 2211.28 of the platform.

CISA warns admins to check two Citrix issues

Citrix has issued high-severity fixes for two flaws in its Workspace app for Windows, affecting the current release before version 2405 and long-term releases before 2402 LTSR CU1.

CVE-2024-7889 is a privilege elevation flaw, rated CVSS 7.0, that would allow a local user to upgrade themselves to SYSTEM status because of improper resource handling by the code. CVE-2024-7890, rated CVSS 5.4, sorts out improper privilege management that could also lead to an attacker getting SYSTEM access. Both issues require local access to a target machine.

“A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system,” the US security agency warned. “CISA encourages users and administrators to review the following and apply necessary update.”

Ivanti irritations, again

CISA is also warning about vulnerabilities in Ivanti Endpoint Manager 2022 and 2024, Cloud Service Application 4.6, and Workspace Control 10.18.0.0 and below, months after it reported the software biz was leaving US chemical facilities vulnerable with previous security failings.

Endpoint Manager’s problems are the most severe, with 16 CVEs named including a CVSS 10.0 issue that allows full remote code execution on EPM before 2022 SU6, or the 2024 September update, due to the agency portal mishandling untrusted data. Nine other critical CVSS 9.1 issues are also reported, as well as two high priority issues (including an RCE issue) and one medium flaw.

There’s CVE-2024-8190 for all versions of Ivanti’s Cloud Service Application 4.6 before patch 519, allowing a remote authenticated attacker to run code – but only if they have admin privileges. Workspace Control has six high-severity CVEs, all of which would allow locally authenticated users to upgrade their network privileges. ®

Updated to add on September 13

Ivanti says it’s now seen exploitation of the CVE-2024-8190 flaw in the wild. “At the time of this update, we are aware of a limited number of customers who have been exploited,” the vendor noted.

“Successful exploitation could lead to unauthorized access to the device running the CSA. Dual-homed CSA configurations with ETH-0 as an internal network, as recommended by Ivanti, are at a significantly reduced risk of exploitation.”

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
Wear Hue App: Smarte Lampen per Wear OS-Uhr steuern thumbnail

Wear Hue App: Smarte Lampen per Wear OS-Uhr steuern

Mit Wear OS smarte Lampen von Philips Hue steuern, erfordert weiterhin Drittanbieter-Apps. Es gibt eine neue interessante Alternative. Es gibt eine neue Wear OS-App für Hue-Lampen. Sie ist simpel und perfekt zur Hue-Bedienung. Etwas mehr als einen Euro muss sie euch wert sein. Habt ihr ein smartes Zuhause mit Hue-System integriert und eine Smartwatch am…
Read More
Your Apple Watch Might Save Your Life thumbnail

Your Apple Watch Might Save Your Life

As you read this, a medical tool could reveal a ticking time bomb for your health -- and it’s ticking away electronically on your wrist. The sensors in a typical smartwatch can track increasingly sophisticated biomarkers, which a generation ago would’ve read like science fiction. No longer: Apple’s ECG app can conduct an electrocardiogram from
Read More
Model 3 und Model Y: Tesla liefert Autos ohne autonome Fahroption aus thumbnail

Model 3 und Model Y: Tesla liefert Autos ohne autonome Fahroption aus

Cookies zustimmen Besuchen Sie Golem.de wie gewohnt mit Werbung und Tracking, indem Sie der Nutzung aller Cookies zustimmen. Details zum Tracking finden Sie im Privacy Center. Skript wurde nicht geladen. Informationen zur Problembehandlung finden Sie hier. Um der Nutzung von Golem.de mit Cookies zustimmen zu können, müssen Cookies in Ihrem Browser aktiviert sein. Weitere Informationen…
Read More
动力电池供不应求 大赢家却不是宁德时代 thumbnail

动力电池供不应求 大赢家却不是宁德时代

在这一轮芯片短缺当中,受影响最大的是传统大型整车厂,专注新能源车制造的企业普遍表现较好,新能源车销量逆势上扬也成为今年整个汽车行业的重要趋势。但是每家新能源整车厂也都在如履薄冰,因为他们不光要面临芯片短缺,还有动力电池短缺,也成为影响生产的重要因素,以至于最近两三个月,“电池荒”的说法不断见诸报端。经过《财经十一人》记者的调查,发现动力电池的供应的确比较紧张,但远没有达到芯片荒的程度。但电池供不应求的持续时间将超过芯片,在未来至少5年内,动力电池都将处于供不应求的状态。另外,在最近的电池市场上,因供不应求而坐享红利的并非电池生产企业,上游原材料和设备供应商获得了绝大部分红利。不论是原材料涨价还是资本市场的青睐,上游企业才是这一轮动力电池行情的最大受益者。在与多位行业人士深入交流之后,《财经十一人》认为,想要在这一轮动力电池的盛宴中真正笑到最后,不论是电池企业还是上游配套企业,需要在高品质、低碳乃至零碳生产、全球化布局本地化生产方面有所建树,否则即便可以在当前短期获利,也会面对被快速淘汰的风险。不是缺电池,是缺好电池不能将电池短缺与芯片短缺相提并论,最大的原因在于两者成因不同。芯片短缺最主要的是生产和流通环节出了问题。而电池则主要是市场需求的快速增长造成的供不应求。根据BloombergNEF今年6月最新的预估,到2030年,全球动力电池的需求量将达到2700GWh,这一预测与去年同期的预测相比增加了35%,相比于2020年全球锂电池装机量137GWh,10年时间,将增长近20倍。其中最大的增量来自于乘用车的动力电池。图片来源:BloombergNEF但即便已经增加了35%,但多位行业人士依然认为当前的预测偏于保守。全国工商联汽车经销商商会新能源分会会长李金勇认为,现在对新能源车增速最乐观的预测都可能是保守的。2021年和2022年中国新能源车销量之和肯定超过600万台,这比过去十年的总和都要多。一旦市场突破一个阈值,后面的增速会远超此前的市场预期。目前多家调研机构都在大幅度上调2025和2030年中国新能源车的销量预期,对2025年的预测普遍在800万辆左右,而2030年则在1600万辆左右。如果以这两个数字计算,那么单单车用动力电池,2025年就需要至少500GWh,2030年将不低于1000GWh。再以当前车用动力电池占整个动力电池70%及中国市场占全球40%的数据计算,到2030年,全球动力电池的市场需求将超过3500GWh。而且目前的电池增长预期还并未考虑对铅酸电池的大规模替代。据行业专家介绍,目前铅酸电池的市场存量依然高达每年500GWh,主要用于两轮车和储能场景。铅酸电池的安全性和成本目前依然有锂电池无法比拟的优势。但是在未来十年内,随着锂电池成本的进一步降低和安全技术的发展,击穿铅酸电池成本线的情况随时可能发生。目前的铅酸替代已经在车用低压电池(小电瓶)和两轮车领域启动,这些应用场景此前主要使用高品质铅酸电池,价格较高,目前锂电池的性价比在这些领域已经领先铅酸电池。未来随着锂电池成本的下降,替代需求大幅度释放之后,将会成为供应紧张的重要原因。不论是BloombergNEF预测的数据,还是根据电动车销量预期推算的数字,亦或是计算铅酸替代的潜在影响,都表明动力电池的市场需求在未来10年将增长至少20倍,甚至30倍以上,这样的快速增长是造成动力电池供应紧张的根本原因。虽然需求增长旺盛,但其实行业的总体产能是可以满足市场需求的。据BloombergNEF预测,到2025年,全球动力电池需求量约为1200GWh,而同期全球电池产能预计超过2000GWh,总体产能充裕。电池供应上的确存在部分缺口,但电池荒可能性极低。那为什么车企还对电池供应情况如此担忧呢?主要是高端产能不足。在电池行业当中,车用动力电池是技术水平最高,生产要求最严苛的高端产品,而目前全球电池制造行业的结构是低端产能过剩,高端产能不足。整车企业抱怨拿不到电池,其实并不是市场上没有电池,而是没有达到车用标准的好电池。以2021年上半年的数据为例,整个车用动力电池行业前十名的企业占据了92.5%的市场份额,市场高度集中,而前十名企业的总产能在整个行业中占比不到50%。几家头部企业的产能利用率一直高达80%以上,而前十名以外的大部分企业,产能利用率低至10%甚至以下,正在被逐步淘汰。这也是为什么过去一年多时间里,头部电池企业快速扩产的原因。资本市场也对电池企业的扩产给予了大力支持,不论是宁德时代去年和今年两次分别为200亿和582亿元的天量定增,还是中航锂电连续两轮超百亿元规模的融资,都表明资本市场用钱包在支持头部电池企业快速扩产。但最近电池企业对资本市场的吸引力正在下滑,因为在锂电池的增长狂潮中,出现了另一个比电池厂更好的投资标的,上游原料和加工设备企业。上游企业数钱数到手抽筋锂电池的关键原材料主要有:正极相关的碳酸锂、氢氧化锂;负极相关的石墨;隔膜材料;铜箔;电解液相关的六氟磷酸锂、VC溶剂、PVDF添加剂。近一年来,锂电池原材料的涨价已经引发了市场的高度关注。9月29日,央视财经频道报道锂电池部分原材料价格相比年初已经上涨超200%。但实际上200%的涨幅在锂电池的各类原材料当中并不算夸张的,央视财经频道更为关注碳酸锂,主要是因为过去一个月,碳酸锂猛涨了50%,是所有锂电池原材料中短期涨幅最大的主材。在锂电池相关原料中,六氟磷酸锂是今年市场中公认的大热。从去年同期的7万元一吨,到现在已经上涨到45万元一吨,而且这个价格只针对签有长期供货协议的大客户,市场上根本买不到现货,少量现货的市场成交价已经超过百万元一吨,甚至有的企业会按克售卖。过去六氟磷酸锂在整个锂电池的原料成本中占比不到3%,而今年已经超过10%。以销售六氟磷酸锂为主要业务的多佛多(SZ.002407)为例,2021年上半年业绩报告显示,在营收同比增长67.68%的前提下,利润同比增幅高达1859.97%。资本市场看好上游企业的原因并不复杂。远景动力中国区总裁赵卫军表示,现在的动力电池不是标准品,主流车企都会要求电池对车型进行适配,定制化生产,一条生产线,甚至一个工厂只为一到两个客户服务是常态。但是新能源车市场还处在早期发展阶段,整体增速虽然是确定的,但单一产品能否成功则有不确定性。如果电池企业适配的车型销量不足,即便改造生产线转产其他型号电池,也会给电池企业造成巨大损失。上游企业就不存在这种不确定性,原材料是高度标准化的工业品,只要整个市场有增量,那就一定能兑现为每个企业的发展壮大,这是资本市场更看好上游企业的主要原因。从年初至今,原材料和制造设备领域,就有17家上市公司的股价增长超过100%,这些公司的普遍特征是,2021年上半年的利润同比增幅远超营收增幅。再来看看电池制造上市公司的同期表现。几家主要的电池制造上市公司虽然营收和利润也都有不错的增长表现,但是和电池装机量的增幅并不匹配。电池企业虽然卖掉了更多的电池,但却并没有产生相应的盈利增长。在毛利率方面也的确证明电池企业在这一轮的增长当中的确并没有收获最大的红利。除了龙头企业宁德时代的毛利率勉强保持没有下滑之外,其他动力电池企业的毛利均有所下滑,电池企业的盈利空间被原材料的涨价大幅蚕食。对于这一点,多家电池企业都表示颇为无奈,有多位电池企业的工作人员向《财经十一人》表示,原材料涨价已经接近电池企业的承受极限,特别是最近一个月,碳酸锂等主材的快速涨价以及六氟磷酸锂、VC溶剂的不合理高价,都在考验电池企业的承受力极限。不过从长期来看,动力电池原材料的供应情况是可以得到缓解的,根据不同原材料的储量、开采难度、制造难度、价格,整个电池行业都在进行着实时的调整。比如材料更充裕,价格更低的磷酸铁锂电池近两年就在大幅反弹,BloombergNEF对磷酸铁锂电池在2030年的占比预期也从去年的23%大幅度提升到53%。根据BloombergNEF的预期,此前最容易引起电池行业紧张的钴元素,因为低钴和无钴电池技术的发展,未来十年的需求量增幅将仅有50%,铜、铝、锂、镍等元素的增幅为4倍多,磷、贴、锰的需求增幅更大,达到5倍以上。但总体上各类原材料并不存在致命的短缺。图片来源:BloombergNEF产能不足、供不应求,扩产是理所当然的选择。但从去年锂电池原材料价格开始上涨以来,原材料企业的扩产意愿却并不强烈,因为在锂电池原材料领域曾经发生过数次盲目扩产以致产能过剩,价格暴跌的故事。巧合的是上次价格暴跌的主角正是这次价格暴涨的明星——六氟磷酸锂。从2017年-2020年初,六氟磷酸锂因为之前扩张的产能投产,加之2018年-2019年的新能源车市场增长不及预期,导致价格从2017年的42万元一吨下跌到7万元一吨。也正是因为有过之前的暴跌阴影,所以这一轮价格上涨周期虽然已经超过一年,但直到2021年下半年,六氟磷酸锂的龙头企业多氟多和天赐材料才下定决心扩产,分别宣布了到2025年实现年产10万吨和15万吨的扩产计划。25万吨的年产能,足以满足2000GWh动力电池的生产需要。但考虑到产线建设周期和产能爬坡的时间,现有的六氟磷酸锂供应紧张局面至少还会持续到2023年初才能有所缓解。为了保证供应,在9月份海口举行的世界新能源汽车大会上,工业和信息化部副部长辛国斌在讲话中表示,“目前中国新能源车成本依然偏高。另外,电动车关键部件动力电池面临锂钴镍等矿产资源保障和价格上涨压力,工信部将与相关部门一起加快统筹,提高保障能力。”这一讲话被市场解读为将打压电池原材料的价格,甚至不排除采用集采方式控制价格过快上涨,随后市场上锂电池原材料相关个股大面积下跌。某头部电池制造企业的员工对《财经十一人》表示,辛部长的讲话就是在提醒一些电池原材料企业,在价格上要有所控制。在以车用动力电池为主要产品的电池企业看来,目前的电池原材料企业还没有适应车用原材料的大规模供应方式,多数还停留在过去为3C消费品电池供货的状态,批量小,价格波动大。但未来以车用动力电池为主的电池市场对原材料供应的要求就是大批量稳定供应。但也有动力电池企业认为上游企业的这种好日子是正常现象。远景动力中国区总裁赵卫军表示,想要尽快让整个产业适应高速增长的电池需要,资本市场的手段是必由之路,最近一年上游企业的股价上涨,价格上涨其实就是资本运作的一种表现。上游企业通过抬升市场预期,拔高估值,进行更大规模的融资,只有这样才能更快完成整个产业的扩张与进步。在市场景气的时候扩张规模是常规操作,但是在动力电池长期供不应求的市场预期下,扩产也依然会面临风险,想要让电池市场的增长真正兑现到企业的成长上,不论是电池企业还是原材料企业,都需要在电池品质、本地化生产、低碳乃至零碳生产方面取得突破,才有可能在这一轮的电池增长中笑到最后。高品质、低碳、本地化,做到这些才能赢从去年开始,先是电池制造企业开始快速扩大产能,根据目前几家头部电池企业公布的扩产计划,到2025年,中国前十位的电池企业产能相加至少要超过1500GWh。目前正在掀起的原材料扩产浪潮也有类似的表现,仅几家头部企业的扩产计划就足以满足未来全国乃至全球市场的全部需要。为了避免电池级上游原材料的产能扩张重复低端产能过剩,高端产能不足的老路,整个行业必须清楚未来的全球电池市场究竟需要怎样的产品。这方面,赵卫军在《懂车Talks》的一期节目中表示,因为远景动力在美国、欧洲、日本、中国同时建有电池生产基地,基于对各国市场的了解,他判断未来的电池市场缺的不是电池,而是高品质、低碳和本地化生产的动力电池,这样的电池将长期供不应求。随着新能源车的进一步普及,未来单车700公里以上的续航能力将成为主流标准,而这个续航能力对应的电池容量约为100KWh,这一点在多款新车上已经得到印证。如极氪001高配车型的电池容量为100KWh,蔚来的大电池包100KWh,奔驰的新款EQS电池包也超过100KWh,电池容量已经不是问题。除了能量密度,电池未来更主要的突破是在快充性能、安全性能、低温性能和电池寿命。15分钟充满的快充能力;任何情况下不起明火,不爆炸的安全性能;在我国北方冬季性能损失不超过15%的低温表现;循环寿命超过100万公里,这是未来高品质电池的普遍要求。低碳甚至零碳是当前对电池及相关企业的新要求。未来的动力电池是交通脱碳的重要基础,但如果动力电池的制造本身是高碳排放的,那就纯属多此一举,因此未来的动力电池必然是低碳甚至零碳制造的。这方面欧洲企业的起步最早,要求也最严格,赵卫军透露,在今年的沃尔沃供应商大会上,沃尔沃已经明确提出,到2025年,所有的Tier1供应商必须实现范围一(主要是企业资深生产运营的碳排放)和范围二(主要是企业采购的产品、服务、能源的碳排放)的碳中和,如果不达标,将直接丧失供应商资格。宝马和沃尔沃类似,虽然还未提出明确的供应商碳中和时间表,但已经开始要求供应商提供碳排放数据供宝马审核,未来碳排放将成为宝马评判供应商的重要参数。这方面中国企业的步调显然是落后的,目前尚无整车厂提出明确的碳中和时间表,也没有对供应商的碳足迹核算要求,这可能会导致未来中国的新能源车以及动力电池在全球竞争中面临丧失入场券的风险。目前欧洲还没有法规要求动力电池必须低碳或零碳,但50欧元一吨的碳价和欧洲本身的低碳优势都预示着欧盟不可能坐视他国的高碳排放产品畅通无阻的流入欧洲。赵卫军表示,未来的欧洲不论是通过设立碳边境调节税还是碳排放准入门槛,总之,做不到低碳的电池一定会被踢出欧洲市场。中国的双碳目标同样压力巨大,政府不可能坐视高碳排放的动力电池大量生产销售。虽然不会像欧洲那么激进,但可以设立动力电池的碳排放核查机制,再通过类似双积分或碳市场的制度对低碳动力电池产品给予补贴支持,通过这些举措让高碳电池加速退出市场。最后全球化布局本地化生产是现在各个主要国家对重要工业品的共同要求,因为疫情的影响,全球的供应链重构,动力电池作为未来新能源车供应链当中最重要的一部分,如果无法实现本地化,将很难进入主流市场。目前国内的动力电池企业已经有六家在欧洲布局,分别是宁德时代(德国)、国轩高科(德国)、蜂巢能源(德国)、孚能科技(德国)、远景动力(英国、法国)、比亚迪(筹建中,东欧)。本地化除了供应链安全之外,还有成本和减碳方面的考虑。未来随着锂电池成本的进一步降低,锂电池的运输成本占比将持续上升,长距离从国内出口电池到海外市场越来越不划算。另外,如果电池需要长途运输,那么运输的碳排放将计入产品之中,对于电池减碳也有不利影响。电池的供应紧张局面将长期存在,特别是高端车用动力电池,供不应求在2025年前很难缓解,但并不会发生类似芯片荒的恶性短缺,属于正常的供应紧张。电池原材料在这一轮行情之中获利最大,不论是涨价收获的超额利润,还是资本市场上的高估值带来的融资机会,都让上游企业成为了本轮电池行情的最大赢家。但要想成为这一轮长达10年的动力电池浪潮的最终赢家,还是要苦炼内功方为上策。在快充、安全、低温新能方面取得技术突破;在低碳方面早做准备;产能布局接近用户,只有做到这三点,才能真正在这场动力电池的盛宴中成为最后留在餐桌上的人。作者为《财经》记者,编辑:马克
Read More
Index Of News