July 2024 Microsoft Patch Tuesday: 138 Vulnerabilities and Critical Threats

 

Microsoft releases 138 fixes for July 2024 Patch Tuesday, including multiple Critical Threats

This month, Microsoft has rolled out a significant update, deploying an impressive 138 fixes.  Among these, several vulnerabilities are deemed weaponized, with some carrying a CVSS score of 9.8.  This release, which is the second largest in Microsoft’s history, follows the record-setting 147 fixes issued a few months ago.  The latest batch of patches includes 5 critical fixes, 133 important ones, and several moderate updates.  These span a wide range of products including Windows, Windows Components, Office, Azure, SQL Server, Visual Studio, Remote Desktop, Hyper-V, and Secure Boot.

Robert Brown, Head of Customer Success at Syxsense, emphasizes the importance of strategic prioritization in vulnerability management.  He highlights the presence of threats with the potential to act as Jump Points, urging organizations to remain vigilant.  With a combined CVSS score of 1087 for July and an average score of 7.9 — higher than the previous month — the severity of these vulnerabilities requires meticulous attention.

Based on Vendor Severity and CVSS Scores, we recommend integrating the provided CVE numbers into your Patch Management solution. Once thorough testing is complete, deployment should proceed without delay.

CVE-2024-38080 – Windows Hyper-V Elevation of Privilege Vulnerability

Anonymously submitted to Microsoft, CVE-2024-38080 is a Windows Hyper-V Elevation of Privilege vulnerability. If successfully exploited, this vulnerability could allow an attacker to gain SYSTEM privileges, posing a significant risk to affected systems.

Syxscore:

  • Vendor Severity: Important
  • CVSS: 7.8
  • Weaponised: Yes
  • Public Awareness: No
  • Countermeasure: No

Risk Factors:

  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope / Jump Point: Unchanged / No

Implications:

The fact that this vulnerability has been weaponized underscores its potential danger. With a low attack complexity and minimal privileges required, an attacker could exploit this vulnerability locally without user interaction. The elevated risk associated with gaining SYSTEM privileges makes it critical for organizations to address this promptly.

Despite not being publicly known, the lack of countermeasures highlights the urgency for deploying patches and reinforcing security protocols. Organizations using Windows Hyper-V should prioritize this update to mitigate potential exploitation.

CVE-2024-35264 – .NET and Visual Studio Remote Code Execution Vulnerability

CVE-2024-35264 is a remote code execution vulnerability affecting .NET and Visual Studio.  An attacker can exploit this by closing an HTTP/3 stream while the request body is being processed, leading to a race condition and potentially allowing remote code execution.

Syxscore:

  • Vendor Severity: Important
  • CVSS: 8.1
  • Weaponised: No
  • Public Aware: Yes
  • Countermeasure: No

Risk Factors:

  • Attack Vector: Network
  • Attack Complexity: High
  • Privileges Required: None
  • User Interaction: None
  • Scope / Jump Point: Unchanged / No

Implications:

The public awareness of this vulnerability heightens its potential threat, despite it not being weaponized.  With a CVSS score of 8.1, the severity is significant, indicating that successful exploitation could have serious consequences.  This vulnerability is exploited over the network with no required privileges or user interaction, making it a critical issue to address.  However, the high attack complexity may limit the number of potential attackers capable of exploiting it.  The absence of countermeasures necessitates prompt attention to patching and securing affected systems.

Organizations utilizing .NET and Visual Studio should prioritize updates and patches to mitigate the risk of remote code execution.  Given the nature of this vulnerability, proactive measures and vigilance are essential to maintain robust security.

CVE-2024-38074, CVE-2024-38076, & CVE-2024-38077 – Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability

CVE-2024-38074, CVE-2024-38076, and CVE-2024-38077 are critical vulnerabilities affecting the Windows Remote Desktop Licensing Service.  An attacker could exploit these vulnerabilities by sending a specially crafted packet to a server configured as a Remote Desktop Licensing server, resulting in remote code execution.

Syxscore:

  • Vendor Severity: Critical
  • CVSS: 9.8
  • Weaponised: No
  • Public Aware: No
  • Countermeasure: Yes – Disable the Licensing Service

Risk Factors:

  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope / Jump Point: Unchanged / No

Implications:

These vulnerabilities have been assigned a CVSS score of 9.8, indicating their critical nature.  The ability for an attacker to achieve remote code execution by simply sending a specially crafted packet over the network, with no required privileges or user interaction, significantly heightens the risk.

Despite these vulnerabilities not being weaponized or publicly known, their critical severity demands immediate attention.  The presence of a countermeasure—disabling the Licensing Service—provides a temporary mitigation strategy while awaiting this permanent fix.  Given the low attack complexity and the potential impact of remote code execution, it is crucial for organizations using Windows Remote Desktop Licensing Service to implement the recommended countermeasure and prioritize patching these vulnerabilities.  By proactively addressing these vulnerabilities, organizations can significantly reduce the risk of exploitation and maintain the integrity and security of their systems.

Reference Description Vendor Severity CVSS Score Weaponised Publicly Aware Additional Details Countermeasure Impact Exploitability Assessment
CVE-2024-38080 Windows Hyper-V Elevation of Privilege Vulnerability Important 7.8 Yes No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.   Elevation of Privilege Exploitation Detected
CVE-2024-38112 Windows MSHTML Platform Spoofing Vulnerability Important 7.5 Yes No     Spoofing Exploitation Detected
CVE-2024-35264 .NET and Visual Studio Remote Code Execution Vulnerability Important 8.1 No Yes     Remote Code Execution Exploitation Less Likely
CVE-2024-38074 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability Critical 9.8 No No An attacker could send a specially crafted packet to a server set up as a Remote Desktop Licensing server, which will cause remote code execution. Yes
If you no longer need this service on your system, consider disabling it as a security best practice. Disabling unused and unneeded services helps reduce your exposure to security vulnerabilities.
Remote Code Execution Exploitation Less Likely
CVE-2024-38076 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability Critical 9.8 No No An attacker could send a specially crafted packet to a server set up as a Remote Desktop Licensing server, which will cause remote code execution. Yes
If you no longer need this service on your system, consider disabling it as a security best practice. Disabling unused and unneeded services helps reduce your exposure to security vulnerabilities.
Remote Code Execution Exploitation Less Likely
CVE-2024-38077 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability Critical 9.8 No No An attacker could send a specially crafted packet to a server set up as a Remote Desktop Licensing server, which will cause remote code execution. Yes
If you no longer need this service on your system, consider disabling it as a security best practice. Disabling unused and unneeded services helps reduce your exposure to security vulnerabilities.
Remote Code Execution Exploitation Less Likely
CVE-2024-38089 Microsoft Defender for IoT Elevation of Privilege Vulnerability Important 9.1 No No Scope = Changed, Jump Point = True
In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.
  Elevation of Privilege Exploitation Less Likely
CVE-2024-38060 Microsoft Windows Codecs Library Remote Code Execution Vulnerability Critical 8.8 No No     Remote Code Execution Exploitation More Likely
CVE-2024-20701 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-21303 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-21308 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-21317 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-21331 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-21332 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-21333 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-21335 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-21373 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-21398 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-21414 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-21415 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-21417 Windows Text Services Framework Elevation of Privilege Vulnerability Important 8.8 No No Scope = Changed, Jump Point = True
An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained (“sandboxed”) execution environment to a Medium Integrity Level or a High Integrity Level.
  Elevation of Privilege Exploitation Less Likely
CVE-2024-21425 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-21428 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-21449 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-28899 Secure Boot Security Feature Bypass Vulnerability Important 8.8 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-28928 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-30013 Windows MultiPoint Services Remote Code Execution Vulnerability Important 8.8 No No An unauthenticated attacker can exploit this vulnerability by sending a malicious request packet via a client machine to a Windows Server configured to be a Multipoint Service over a network, and then waiting for the server to stop or restart.   Remote Code Execution Exploitation Less Likely
CVE-2024-35256 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-35271 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-35272 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37318 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37319 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37320 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37321 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37322 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37323 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37324 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37326 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37327 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37328 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37329 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37330 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37331 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37332 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37333 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37334 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-37336 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-38021 Microsoft Office Remote Code Execution Vulnerability Important 8.8 No No An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality.   Remote Code Execution Exploitation More Likely
CVE-2024-38053 Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability Important 8.8 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-38087 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-38088 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability Important 8.8 No No An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.   Remote Code Execution Exploitation Less Likely
CVE-2024-38092 Azure CycleCloud Elevation of Privilege Vulnerability Important 8.8 No No     Elevation of Privilege Exploitation Less Likely
CVE-2024-38104 Windows Fax Service Remote Code Execution Vulnerability Important 8.8 No No An authenticated attacker with normal user privileges that has already compromised a fax server, to which the victim is connected, can exploit this vulnerability to execute arbitrary code on the victim machine. Yes
To be exploitable by this vulnerability the Windows Fax Service has to be installed and configured.
Remote Code Execution Exploitation Less Likely
CVE-2024-37969 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37970 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37971 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37972 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37973 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37974 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37975 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37977 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37978 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37981 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37984 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37986 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37987 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37988 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-37989 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-38010 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-38011 Secure Boot Security Feature Bypass Vulnerability Important 8.0 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-30079 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.   Elevation of Privilege Exploitation Less Likely
CVE-2024-35261 Azure Network Watcher VM Extension Elevation of Privilege Vulnerability Important 7.8 No No     Elevation of Privilege Exploitation Less Likely
CVE-2024-38034 Windows Filtering Platform Elevation of Privilege Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could gain administrator privileges.   Elevation of Privilege Exploitation Less Likely
CVE-2024-38043 PowerShell Elevation of Privilege Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could elevate their user privileges from those of a restrained user to an unrestrained WDAC user.   Elevation of Privilege Exploitation Less Likely
CVE-2024-38047 PowerShell Elevation of Privilege Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could elevate their user privileges from those of a restrained user to an unrestrained WDAC user.   Elevation of Privilege Exploitation Less Likely
CVE-2024-38050 Windows Workstation Service Elevation of Privilege Vulnerability Important 7.8 No No     Elevation of Privilege Exploitation Less Likely
CVE-2024-38051 Windows Graphics Component Remote Code Execution Vulnerability Important 7.8 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-38052 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.   Elevation of Privilege Exploitation More Likely
CVE-2024-38054 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.   Elevation of Privilege Exploitation More Likely
CVE-2024-38057 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.   Elevation of Privilege Exploitation Less Likely
CVE-2024-38059 Win32k Elevation of Privilege Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.   Elevation of Privilege Exploitation More Likely
CVE-2024-38062 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.   Elevation of Privilege Exploitation Less Likely
CVE-2024-38066 Windows Win32k Elevation of Privilege Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.   Elevation of Privilege Exploitation More Likely
CVE-2024-38070 Windows LockDown Policy (WLDP) Security Feature Bypass Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could bypass the execution policy for the Windows LockDown Policy (WLDP) for the WDAC API.   Security Feature Bypass Exploitation Less Likely
CVE-2024-38079 Windows Graphics Component Elevation of Privilege Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.   Elevation of Privilege Exploitation More Likely
CVE-2024-38085 Windows Graphics Component Elevation of Privilege Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.   Elevation of Privilege Exploitation More Likely
CVE-2024-38100 Windows File Explorer Elevation of Privilege Vulnerability Important 7.8 No No An attacker who successfully exploited this vulnerability could gain administrator privileges.   Elevation of Privilege Exploitation More Likely
CVE-2024-35266 Azure DevOps Server Spoofing Vulnerability Important 7.6 No No     Spoofing Exploitation Less Likely
CVE-2024-35267 Azure DevOps Server Spoofing Vulnerability Important 7.6 No No     Spoofing Exploitation Less Likely
CVE-2024-30098 Windows Cryptographic Services Security Feature Bypass Vulnerability Important 7.5 No No An attacker who successfully exploited this vulnerability could bypass digital signatures on a vulnerable system.   Security Feature Bypass Exploitation Less Likely
CVE-2024-30105 .NET Core and Visual Studio Denial of Service Vulnerability Important 7.5 No No     Denial of Service Exploitation Less Likely
CVE-2024-32987 Microsoft SharePoint Server Information Disclosure Vulnerability Important 7.5 No No     Information Disclosure Exploitation Less Likely
CVE-2024-38015 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability Important 7.5 No No     Denial of Service Exploitation Less Likely
CVE-2024-38031 Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability Important 7.5 No No     Denial of Service Exploitation Less Likely
CVE-2024-38061 DCOM Remote Cross-Session Activation Elevation of Privilege Vulnerability Important 7.5 No No     Elevation of Privilege Exploitation Less Likely
CVE-2024-38064 Windows TCP/IP Information Disclosure Vulnerability Important 7.5 No No An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.   Information Disclosure Exploitation Less Likely
CVE-2024-38067 Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability Important 7.5 No No     Denial of Service Exploitation Less Likely
CVE-2024-38068 Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability Important 7.5 No No     Denial of Service Exploitation Less Likely
CVE-2024-38071 Windows Remote Desktop Licensing Service Denial of Service Vulnerability Important 7.5 No No An attacker could impact availability of the service resulting in Denial of Service (DoS).   Denial of Service Exploitation Less Likely
CVE-2024-38072 Windows Remote Desktop Licensing Service Denial of Service Vulnerability Important 7.5 No No An attacker could impact availability of the service resulting in Denial of Service (DoS).   Denial of Service Exploitation Less Likely
CVE-2024-38073 Windows Remote Desktop Licensing Service Denial of Service Vulnerability Important 7.5 No No An attacker could impact availability of the service resulting in Denial of Service (DoS).   Denial of Service Exploitation Less Likely
CVE-2024-38078 Xbox Wireless Adapter Remote Code Execution Vulnerability Important 7.5 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-38091 Microsoft WS-Discovery Denial of Service Vulnerability Important 7.5 No No     Denial of Service Exploitation Less Likely
CVE-2024-38095 .NET and Visual Studio Denial of Service Vulnerability Important 7.5 No No     Denial of Service Exploitation Less Likely
CVE-2024-30061 Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability Important 7.3 No No This vulnerability discloses data stored in the underlying datasets in Dataverse, that could include Personal Identifiable Information.   Information Disclosure Exploitation Less Likely
CVE-2024-38033 PowerShell Elevation of Privilege Vulnerability Important 7.3 No No     Elevation of Privilege Exploitation Less Likely
CVE-2024-38081 .NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability Important 7.3 No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.   Elevation of Privilege Exploitation Less Likely
CVE-2024-38023 Microsoft SharePoint Server Remote Code Execution Vulnerability Critical 7.2 No No     Remote Code Execution Exploitation More Likely
CVE-2024-38019 Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability Important 7.2 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-38024 Microsoft SharePoint Server Remote Code Execution Vulnerability Important 7.2 No No     Remote Code Execution Exploitation More Likely
CVE-2024-38025 Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability Important 7.2 No No To exploit this vulnerability, a victim machine must be running a performance counter collection tool such as Performance Monitor to collect performance counter data from an attacker machine. An attacker with local admin authority on the attacker machine could run malicious code remotely in the victim machine’s performance counter data collector process.   Remote Code Execution Exploitation Less Likely
CVE-2024-38028 Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability Important 7.2 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-38044 DHCP Server Service Remote Code Execution Vulnerability Important 7.2 No No Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated DHCP Server privileges. As is best practice, regular validation and audits of administrative groups should be conducted.   Remote Code Execution Exploitation Less Likely
CVE-2024-38094 Microsoft SharePoint Remote Code Execution Vulnerability Important 7.2 No No     Remote Code Execution Exploitation More Likely
CVE-2024-30081 Windows NTLM Spoofing Vulnerability Important 7.1 No No     Spoofing Exploitation Less Likely
CVE-2024-38032 Microsoft Xbox Remote Code Execution Vulnerability Important 7.1 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-38022 Windows Image Acquisition Elevation of Privilege Vulnerability Important 7.0 No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.   Elevation of Privilege Exploitation Less Likely
CVE-2024-38069 Windows Enroll Engine Security Feature Bypass Vulnerability Important 7.0 No No An attacker who successfully exploited this vulnerability could bypass certificate validation during the account enrollment process.   Security Feature Bypass Exploitation Less Likely
CVE-2024-26184 Secure Boot Security Feature Bypass Vulnerability Important 6.8 No No     Security Feature Bypass Exploitation Less Likely
CVE-2024-38058 BitLocker Security Feature Bypass Vulnerability Important 6.8 No No     Security Feature Bypass Exploitation Less Likely
CVE-2024-38065 Secure Boot Security Feature Bypass Vulnerability Important 6.8 No No An attacker who successfully exploited this vulnerability could bypass Secure Boot.   Security Feature Bypass Exploitation Less Likely
CVE-2024-38013 Microsoft Windows Server Backup Elevation of Privilege Vulnerability Important 6.7 No No An attacker would be able to delete any system files.   Elevation of Privilege Exploitation Less Likely
CVE-2024-38049 Windows Distributed Transaction Coordinator Remote Code Execution Vulnerability Important 6.6 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-38027 Windows Line Printer Daemon Service Denial of Service Vulnerability Important 6.5 No No     Denial of Service Exploitation Less Likely
CVE-2024-38030 Windows Themes Spoofing Vulnerability Important 6.5 No No An attacker would have to convince the user to load a malicious file onto a vulnerable system, typically by way of an enticement in an Email or Instant Messenger message, and then convince the user to manipulate the specially crafted file, but not necessarily click or open the malicious file. Yes

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigations might apply in your situation:

Systems that have disabled NTLM are not affected.
Spoofing Exploitation Less Likely
CVE-2024-38048 Windows Network Driver Interface Specification (NDIS) Denial of Service Vulnerability Important 6.5 No No     Denial of Service Exploitation Less Likely
CVE-2024-38101 Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability Important 6.5 No No     Denial of Service Exploitation Less Likely
CVE-2024-38102 Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability Important 6.5 No No This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network.   Denial of Service Exploitation Less Likely
CVE-2024-38105 Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability Important 6.5 No No     Denial of Service Exploitation Less Likely
CVE-2024-38020 Microsoft Outlook Spoofing Vulnerability Moderate 6.5 No No Exploiting this vulnerability could allow the disclosure of NTLM hashes.   Spoofing Exploitation Less Likely
CVE-2024-38086 Azure Kinect SDK Remote Code Execution Vulnerability Important 6.4 No No     Remote Code Execution Exploitation Less Likely
CVE-2024-38099 Windows Remote Desktop Licensing Service Denial of Service Vulnerability Important 5.9 No No     Denial of Service Exploitation More Likely
CVE-2024-38017 Microsoft Message Queuing Information Disclosure Vulnerability Important 5.5 No No An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.   Information Disclosure Exploitation Less Likely
CVE-2024-38041 Windows Kernel Information Disclosure Vulnerability Important 5.5 No No     Information Disclosure Exploitation Less Likely
CVE-2024-38055 Microsoft Windows Codecs Library Information Disclosure Vulnerability Important 5.5 No No Exploiting this vulnerability could allow the disclosure of certain kernel memory content.   Information Disclosure Exploitation Less Likely
CVE-2024-38056 Microsoft Windows Codecs Library Information Disclosure Vulnerability Important 5.5 No No An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.   Information Disclosure Exploitation Less Likely
CVE-2024-35270 Windows iSCSI Service Denial of Service Vulnerability Important 5.3 No No     Denial of Service Exploitation Less Likely
CVE-2024-30071 Windows Remote Access Connection Manager Information Disclosure Vulnerability Important 4.7 No No An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.   Information Disclosure Exploitation Less Likely

     

    Do you need help keeping up patches? Syxsense’s automated patch management capabilities helps enterprises patch faster and more accurately. Schedule a consultation with us to learn how we can help you.