May 2024 Patch Tuesday: Microsoft releases 58 fixes this month including 2 Weaponised Threats.

Microsoft releases 58 fixes for May 2024 Patch Tuesday including 2 Weaponised Threats

In Microsoft’s latest defensive manoeuvre, they have deployed an arsenal of 58 fixes this month, including the remediation of 2 weaponized threats.  Within this comprehensive bug list, 56 fixes of importance and moderate severity stand sentinel over several critical areas of the Microsoft ecosystem, spanning Windows, Windows Components, Office, Azure, .NET Framework, Visual Studio, and PowerBI.  This return to regular update cadence comes as a welcomed respite following the unprecedented bout of 147 updates last month.

Robert Brown, the Head of Customer Success at Syxsense, underscores the imperative of strategic prioritization in vulnerability management.  He warns of the presence of threats carrying the Jump Point, urging a vigilant approach.  With a combined CVSS score of 419.8 for May, and an average score of 7.2, the severity of the vulnerabilities demands thorough attention.

Drawing upon the metrics of Vendor Severity and CVSS Scores, we offer the following recommendations.  Swiftly integrate the provided CVE numbers into your Patch Management systems, and upon completion of thorough testing, deployment should proceed expeditiously.  Let us fortify our cyber defense with unwavering diligence and precision, together.

CVE-2024-30051 – Windows DWM Core Library Elevation of Privilege Vulnerability

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

Note:  The vulnerability is being Weaponised & Publicly Aware

Syxscore

  • Vendor Severity: Important
  • CVSS: 7.8
  • Weaponised: Yes
  • Public Aware: Yes
  • Countermeasure: No

Risk

  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope / Jump Point: Unchanged / No

CVE-2024-30040 – Windows MSHTML Platform Security Feature Bypass Vulnerability

An attacker would have to convince the user to load a malicious file onto a vulnerable system, typically by way of an enticement in an Email or Instant Messenger message, and then convince the user to manipulate the specially crafted file, but not necessarily click or open the malicious file.

This vulnerability bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE controls.

Note:  The vulnerability is being Weaponised

Syxscore

  • Vendor Severity: Important
  • CVSS: 8.8
  • Weaponised: Yes
  • Public Aware: No
  • Countermeasure: Yes

Risk

  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: Required
  • Scope / Jump Point: Unchanged / No

CVE-2024-30007 – Microsoft Brokering File System Elevation of Privilege Vulnerability

In this case, a successful attack could be performed from a low privilege AppContainer.  The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.

Note:  The vulnerability has a Jump Point

Syxscore

  • Vendor Severity: Important
  • CVSS: 8.8
  • Weaponised: No
  • Public Aware: No
  • Countermeasure: No

Risk

  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope / Jump Point: Changed / Yes
Reference Description Vendor Severity CVSS Score Publicly Aware Weaponised Countermeasure Additional Notes Bug Type Exploitability Assessment
CVE-2024-30051 Windows DWM Core Library Elevation of Privilege Vulnerability Important 7.8 Yes Yes   An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Detected
CVE-2024-30040 Windows MSHTML Platform Security Feature Bypass Vulnerability Important 8.8 No Yes Yes An attacker would have to convince the user to load a malicious file onto a vulnerable system, typically by way of an enticement in an Email or Instant Messenger message, and then convince the user to manipulate the specially crafted file, but not necessarily click or open the malicious file. Security Feature Bypass Exploitation Detected
CVE-2024-30046 ASP.NET Core Denial of Service Vulnerability Important 5.9 Yes No     Denial of Service  
CVE-2024-30044 Microsoft SharePoint Server Remote Code Execution Vulnerability Critical 8.8 No No     Remote Code Execution Exploitation More Likely
CVE-2024-30007 Microsoft Brokering File System Elevation of Privilege Vulnerability Important 8.8 No No   Scope = Changed, Jump Point = True

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.

Elevation of Privilege  
CVE-2024-30006 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability Important 8.8 No No     Remote Code Execution  
CVE-2024-30010 Windows Hyper-V Remote Code Execution Vulnerability Important 8.8 No No   An attacker who successfully exploited this vulnerability could send malformed packets to Hyper-V Replica endpoints on the host from a remote machine. Remote Code Execution  
CVE-2024-30017 Windows Hyper-V Remote Code Execution Vulnerability Important 8.8 No No     Remote Code Execution  
CVE-2024-30009 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No     Remote Code Execution  
CVE-2024-30020 Windows Cryptographic Services Remote Code Execution Vulnerability Important 8.1 No No     Remote Code Execution  
CVE-2024-30042 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No     Remote Code Execution  
CVE-2024-26238 Microsoft PLUG Scheduler Scheduled Task Elevation of Privilege Vulnerability Important 7.8 No No     Elevation of Privilege  
CVE-2024-29994 Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability Important 7.8 No No   An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege  
CVE-2024-30027 NTFS Elevation of Privilege Vulnerability Important 7.8 No No   An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege  
CVE-2024-30028 Win32k Elevation of Privilege Vulnerability Important 7.8 No No   A local, authenticated attacker could gain elevated local system or administrator privileges through a vulnerability in the Win32k.sys driver. Elevation of Privilege  
CVE-2024-30030 Win32k Elevation of Privilege Vulnerability Important 7.8 No No Yes To exploit this vulnerability an attacker must have an account with the User role assigned. Elevation of Privilege Exploitation More Likely
CVE-2024-30038 Win32k Elevation of Privilege Vulnerability Important 7.8 No No   A local, authenticated attacker could gain elevated local system or administrator privileges through a vulnerability in the Win32k.sys driver. Elevation of Privilege Exploitation More Likely
CVE-2024-30031 Windows CNG Key Isolation Service Elevation of Privilege Vulnerability Important 7.8 No No   Scope = Changed, Jump Point = True

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.

Elevation of Privilege  
CVE-2024-29996 Windows Common Log File System Driver Elevation of Privilege Vulnerability Important 7.8 No No     Elevation of Privilege Exploitation More Likely
CVE-2024-30025 Windows Common Log File System Driver Elevation of Privilege Vulnerability Important 7.8 No No   An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-30032 Windows DWM Core Library Elevation of Privilege Vulnerability Important 7.8 No No   An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation More Likely
CVE-2024-30035 Windows DWM Core Library Elevation of Privilege Vulnerability Important 7.8 No No   An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation More Likely
CVE-2024-30018 Windows Kernel Elevation of Privilege Vulnerability Important 7.8 No No   An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege  
CVE-2024-30049 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Important 7.8 No No   An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation More Likely
CVE-2024-30047 Dynamics 365 Customer Insights Spoofing Vulnerability Important 7.6 No No   Scope = Changed, Jump Point = True

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.

Spoofing Vulnerability  
CVE-2024-30048 Dynamics 365 Customer Insights Spoofing Vulnerability Important 7.6 No No   Scope = Changed, Jump Point = True

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.

Spoofing Vulnerability  
CVE-2024-30037 Windows Common Log File System Driver Elevation of Privilege Vulnerability Important 7.5 No No     Elevation of Privilege Exploitation More Likely
CVE-2024-30014 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 7.5 No No     Remote Code Execution  
CVE-2024-30015 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 7.5 No No     Remote Code Execution  
CVE-2024-30022 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 7.5 No No     Remote Code Execution  
CVE-2024-30023 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 7.5 No No     Remote Code Execution  
CVE-2024-30024 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 7.5 No No     Remote Code Execution  
CVE-2024-30029 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 7.5 No No     Remote Code Execution  
CVE-2024-30033 Windows Search Service Elevation of Privilege Vulnerability Important 7 No No   An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege  
CVE-2024-29997 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No     Remote Code Execution  
CVE-2024-29998 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No     Remote Code Execution  
CVE-2024-29999 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No     Remote Code Execution  
CVE-2024-30000 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No     Remote Code Execution  
CVE-2024-30001 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No     Remote Code Execution  
CVE-2024-30002 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No     Remote Code Execution  
CVE-2024-30003 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No     Remote Code Execution  
CVE-2024-30004 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No     Remote Code Execution  
CVE-2024-30005 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No     Remote Code Execution  
CVE-2024-30012 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No     Remote Code Execution  
CVE-2024-30021 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No     Remote Code Execution  
CVE-2024-30019 DHCP Server Service Denial of Service Vulnerability Important 6.5 No No     Denial of Service  
CVE-2024-30054 Microsoft Power BI Client JavaScript SDK Information  Disclosure Vulnerability Important 6.5 No No     Information Disclosure  
CVE-2024-30043 Microsoft SharePoint Server Information  Disclosure Vulnerability Important 6.5 No No     Information Disclosure  
CVE-2024-30036 Windows Deployment Services Information  Disclosure Vulnerability Important 6.5 No No     Information Disclosure  
CVE-2024-30011 Windows Hyper-V Denial of Service Vulnerability Important 6.5 No No     Denial of Service  
CVE-2024-30045 .NET and Visual Studio Remote Code Execution Vulnerability Important 6.3 No No     Remote Code Execution  
CVE-2024-30059 Microsoft Intune for Android Mobile Application Management Tampering Vulnerability Important 6.1 No No     Tampering  
CVE-2024-30034 Windows Cloud Files Mini Filter Driver Information  Disclosure Vulnerability Important 5.5 No No   Exploiting this vulnerability could allow the disclosure of certain kernel memory content. Information Disclosure Exploitation More Likely
CVE-2024-30016 Windows Cryptographic Services Information  Disclosure Vulnerability Important 5.5 No No   An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Information Disclosure  
CVE-2024-30008 Windows DWM Core Library Information  Disclosure Vulnerability Important 5.5 No No   An attacker who successfully exploited this vulnerability could view heap memory from a privileged process running on the server. Information Disclosure  
CVE-2024-30039 Windows Remote Access Connection Manager Information  Disclosure Vulnerability Important 5.5 No No   An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Information Disclosure  
CVE-2024-30041 Microsoft Bing Search Spoofing Vulnerability Important 5.4 No No     Spoofing Vulnerability  
CVE-2024-30050 Windows Mark of the Web Security Feature Bypass Vulnerability Moderate 5.4 No No     Security Feature Bypass Exploitation More Likely