October 2024 Microsoft Patch Tuesday: Addressing 115 Vulnerabilities Including 2 Weaponised Threats

October 2024 Microsoft Patch Tuesday: Addressing 115 Vulnerabilities Including 2 Weaponised Threats

Welcome to the October 2024 Microsoft Patch Tuesday Update

This month, Microsoft has delivered a substantial update, addressing 115 vulnerabilities.  Notably, several of these vulnerabilities have been weaponized AND are publicly aware, with some carrying a critical CVSS score of 9.8.  The update includes 3 critical patches, 108 important fixes, and the remaining as moderate and low, covering products such as Windows, Windows Components, Hyper-V, RDP, Office, Visual Studio, SQL Server and .NET.

Robert Brown, Head of Customer Success at Syxsense, underscores the need for strategic prioritization in vulnerability management.  He draws attention to the presence of threats that could potentially serve as Jump Points, urging organizations to maintain heightened vigilance.  With a combined CVSS score of 849.4 for and an average score of 7.4, the critical nature of these vulnerabilities demands focused and careful remediation efforts.

Based on Vendor Severity and CVSS Scores, we recommend integrating the provided CVE numbers into your Patch Management solution. Once thorough testing is complete, deployment should proceed without delay.

1. CVE-2024-43572 – Microsoft Management Console Remote Code Execution Vulnerability

CVE-2024-43572 is a vulnerability in the Microsoft Management Console (MMC) that can lead to Remote Code Execution (RCE).  While it is categorized as a moderate severity issue, the vulnerability has been weaponized, meaning attackers have already developed exploits for it.  Public awareness of the vulnerability also increases its potential for being targeted in attacks.

Syxscore:

  • Vendor Severity: Moderate
  • CVSS: 7.8 (High severity but not Critical).
  • Weaponized: Yes (exploit tools or methods are already in circulation).
  • Public Awareness: Yes (the vulnerability is publicly known, raising its risk).
  • Countermeasure: No (there is currently no available patch or built-in mitigation).

Risk Factors:

  • Attack Vector: Local (the attacker requires local access to the target system).
  • Attack Complexity: Low (the vulnerability is easy to exploit, requiring minimal effort).
  • Privileges Required: None (the attacker does not need administrative rights).
  • User Interaction: Required (the exploit needs the victim to perform an action, such as opening a malicious file).
  • Scope / Jump Point: Unchanged / No (the exploit does not allow attackers to move laterally across systems).

2. CVE-2024-43573 – Windows MSHTML Platform Spoofing Vulnerability

CVE-2024-43573 is a vulnerability in the MSHTML platform, which is still supported despite the retirement of Internet Explorer 11 and the deprecation of Microsoft Edge Legacy.  This vulnerability allows an attacker to spoof content and potentially manipulate how the platform is perceived by users.  The MSHTML platform is still in use through Internet Explorer mode in Microsoft Edge and through the WebBrowser control in other applications.   This makes it a lingering issue for systems relying on legacy web rendering and scripting engines.

This vulnerability allows an attacker to exploit spoofing vulnerabilities in the MSHTML platform, leading to potential phishing or man-in-the-middle attacks.  This can result in users interacting with malicious content that appears legitimate.  Updates for the MSHTML platform and its scripting engine are delivered through IE Cumulative Updates, ensuring that even legacy systems can stay protected if they apply the proper patches.

Syxscore:

  • Vendor Severity: Moderate
  • CVSS: 6.5 (Moderate severity, likely due to the nature of spoofing attacks rather than more direct code execution).
  • Weaponized: Yes (exploits have been developed).
  • Public Awareness: Yes (known publicly, increasing the risk of exploitation).
  • Countermeasure: No (no specific patch or immediate mitigation beyond updates).

Risk Factors:

  • Attack Vector: Network (exploitable over a network connection, often through a malicious website or web application).
  • Attack Complexity: Low (the vulnerability is easy to exploit).
  • Privileges Required: None (no administrative privileges are required).
  • User Interaction: Required (the user must interact with the malicious content, such as visiting a spoofed site).
  • Scope / Jump Point: Unchanged / No (the exploit does not lead to lateral movement or system access beyond the targeted user session).

3. CVE-2024-43583 – Winlogon Elevation of Privilege Vulnerability

CVE-2024-43583 is an Elevation of Privilege (EoP) vulnerability in Winlogon, a critical component of the Windows operating system responsible for handling user login and session functionality.  Successful exploitation of this vulnerability could allow an attacker to gain SYSTEM-level privileges, enabling them to perform high-impact actions on the affected system, including installing programs, viewing or modifying data, or creating new accounts with full user rights.

The vulnerability can be exploited locally, allowing an attacker with low privileges to elevate their access to SYSTEM — the highest level of privilege in Windows.  With SYSTEM-level access, attackers can take full control of the system, potentially leading to serious security breaches.  The CVSS score of 7.8 reflects the significant risk posed by this vulnerability, even though no weaponized exploit has been detected yet.

Syxscore:

  • Vendor Severity: Important
  • CVSS: 7.8
  • Weaponised: No
  • Public Awareness: Yes
  • Countermeasure: No

Risk Factors:

  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: Low
  • User Interaction: None
  • Scope / Jump Point: Unchanged / No

4. CVE-2024-20659 – Windows Hyper-V Security Feature Bypass Vulnerability

CVE-2024-20659 is a security feature bypass vulnerability in Windows Hyper-V, specifically related to Unified Extensible Firmware Interface (UEFI) on certain hardware configurations.  This vulnerability could allow an attacker to bypass the security features of the UEFI environment, which may lead to the compromise of both the hypervisor and the secure kernel.  Hyper-V, being a key virtualization technology, could leave virtual machines vulnerable to attack if the hypervisor is compromised.

This vulnerability could potentially allow an attacker to bypass the UEFI protection on specific hardware, leading to a full compromise of the Hyper-V environment.  This means that virtual machines running on affected systems could be at risk, especially if the hypervisor and secure kernel are compromised. However, the high attack complexity reduces the likelihood of this vulnerability being easily exploited in practice.

Syxscore:

  • Vendor Severity: Important
  • CVSS: 7.1
  • Weaponised: No
  • Public Awareness: Yes
  • Countermeasure: No

Risk Factors:

  • Attack Vector: Adjacent
  • Attack Complexity: High
  • Privileges Required: None
  • User Interaction: Required
  • Scope / Jump Point: Unchanged / No

5. CVE-2024-43468 – Microsoft Configuration Manager Remote Code Execution Vulnerability

CVE-2024-43468 is a Remote Code Execution (RCE) vulnerability in Microsoft Configuration Manager, which could allow an attacker to execute arbitrary code on a vulnerable system.  The Management Point in Microsoft Configuration Manager, by default, uses its Computer account as the connection account, but this vulnerability suggests enhancing security by configuring an alternate service account.  Doing so can prevent exploitation of this critical vulnerability and improve overall security posture.

If exploited, this vulnerability could enable an attacker to execute code remotely over a network, potentially compromising systems managed by Microsoft Configuration Manager.  With a CVSS score of 9.8, this vulnerability is highly critical due to its network-based attack vector and the absence of required privileges or user interaction.  However, weaponization has not been observed, and countermeasures are available, which can mitigate the threat.

Syxscore:

  • Vendor Severity: Critical
  • CVSS: 9.8
  • Weaponised: No
  • Public Awareness: No
  • Countermeasure: Yes

Risk Factors:

  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope / Jump Point: Unchanged / No

 

Reference Description Severity CVSS Score Weaponised Publicly Aware Countermeasure Additional Details Impact Exploitability Assessment
CVE-2024-43572 Microsoft Management Console Remote Code Execution Vulnerability Moderate 7.8 Yes Yes No   Remote Code Execution Exploitation Detected
CVE-2024-43573 Windows MSHTML Platform Spoofing Vulnerability Moderate 6.5 Yes Yes No   Spoofing Exploitation Detected
CVE-2024-43583 Winlogon Elevation of Privilege Vulnerability Important 7.8 No Yes No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation More Likely
CVE-2024-20659 Windows Hyper-V Security Feature Bypass Vulnerability Important 7.1 No Yes No This Hypervisor vulnerability relates to Virtual Machines within a Unified Extensible Firmware Interface (UEFI) host machine. On some specific hardware it might be possible to bypass the UEFI, which could lead to the compromise of the hypervisor and the secure kernel. Security Feature Bypass Exploitation Less Likely
CVE-2024-43468 Microsoft Configuration Manager Remote Code Execution Vulnerability Critical 9.8 No No Configure an alternate service account as the Management point connection account.

The Management point uses its Computer account by default as the Management point connection account. To enhance your security posture, we recommend specifying an alternate service account instead of the Computer account. More information can be found here: Accounts used – Configuration Manager | Microsoft Learn.
  Remote Code Execution Exploitation Less Likely
CVE-2024-38124 Windows Netlogon Elevation of Privilege Vulnerability Important 9.0 No No Predictable Naming Conventions: Avoid using predictable naming conventions for domain controllers to prevent attackers from renaming their machines to match the next name to be assigned to a new domain controller.
Secure Channel Validation: Ensure that the secure channel is validated against more than just the computer name of the machine it was delivered to. This can help prevent attackers from impersonating the domain controller by obtaining the handle and waiting for the appointment to happen.
Monitor for Renaming Activities: Implement monitoring for any suspicious renaming activities of computers within the network. This can help with early detection and prevention of potential attacks.
Enhanced Authentication Mechanisms: Consider using enhanced authentication mechanisms that go beyond the current validation methods to ensure the authenticity of the domain controller and the secure channel.
Scope = Changed, Jump Point = True

An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities.
Elevation of Privilege Exploitation Less Likely
CVE-2024-43488 Visual Studio Code extension for Arduino Remote Code Execution Vulnerability Critical 8.8 No No No Missing authentication for critical function in Visual Studio Code extension for Arduino allows an unauthenticated attacker to perform remote code execution through network attack vector. Remote Code Execution Exploitation Less Likely
CVE-2024-38179 Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability Important 8.8 No No No Scope = Changed, Jump Point = True

Successful exploitation of this vulnerability could allow an attacker to perform operations in the victim’s hybrid cloud environment with the same privileges as the compromised managed identity.
Elevation of Privilege Exploitation Less Likely
CVE-2024-38212 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-38265 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43453 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43517 Microsoft ActiveX Data Objects Remote Code Execution Vulnerability Important 8.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43518 Windows Telephony Server Remote Code Execution Vulnerability Important 8.8 No No No An attacker could exploit the vulnerability by remotely managing another machine’s Telephony server using the tapisnap.dll tool. This could result in a heap-based buffer out-of-bounds write due to malicious data returned by the Telephony server’s RPC interface. Remote Code Execution Exploitation Less Likely
CVE-2024-43519 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability Important 8.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43532 Remote Registry Service Elevation of Privilege Vulnerability Important 8.8 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-43533 Remote Desktop Client Remote Code Execution Vulnerability Important 8.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43549 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43564 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43589 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43592 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43593 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43599 Remote Desktop Client Remote Code Execution Vulnerability Important 8.8 No No No In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client. Remote Code Execution Exploitation Less Likely
CVE-2024-43607 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43608 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43611 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 8.8 No No No An attacker who successfully exploited this vulnerability could gain remote code execution (RCE) on the victim’s machine. Remote Code Execution Exploitation Less Likely
CVE-2024-43591 Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability Important 8.7 No No No Scope = Changed, Jump Point = True

The vulnerability enables an attacker to run specific Azure CLI commands to perform service management operations or deploy other Azure resources in the victim’s subscription.
Elevation of Privilege Exploitation Less Likely
CVE-2024-43497 DeepSpeed Remote Code Execution Vulnerability Low 8.4 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43574 Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability Important 8.3 No No No Scope = Changed, Jump Point = True

This vulnerability could lead to a browser sandbox escape.
Remote Code Execution Exploitation Less Likely
CVE-2024-43582 Remote Desktop Protocol Server Remote Code Execution Vulnerability Critical 8.1 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-38229 .NET and Visual Studio Remote Code Execution Vulnerability Important 8.1 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-30092 Windows Hyper-V Remote Code Execution Vulnerability Important 8.0 No No No Scope = Changed, Jump Point = True Remote Code Execution Exploitation Less Likely
CVE-2024-38261 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability Important 7.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43501 Windows Common Log File System Driver Elevation of Privilege Vulnerability Important 7.8 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-43503 Microsoft SharePoint Elevation of Privilege Vulnerability Important 7.8 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-43504 Microsoft Excel Remote Code Execution Vulnerability Important 7.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43505 Microsoft Office Visio Remote Code Execution Vulnerability Important 7.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43509 Windows Graphics Component Elevation of Privilege Vulnerability Important 7.8 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation More Likely
CVE-2024-43514 Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability Important 7.8 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-43516 Windows Secure Kernel Mode Elevation of Privilege Vulnerability Important 7.8 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-43527 Windows Kernel Elevation of Privilege Vulnerability Important 7.8 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-43528 Windows Secure Kernel Mode Elevation of Privilege Vulnerability Important 7.8 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-43551 Windows Storage Elevation of Privilege Vulnerability Important 7.8 No No No   Elevation of Privilege Exploitation Less Likely
CVE-2024-43556 Windows Graphics Component Elevation of Privilege Vulnerability Important 7.8 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation More Likely
CVE-2024-43560 Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability Important 7.8 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation More Likely
CVE-2024-43563 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability Important 7.8 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-43576 Microsoft Office Remote Code Execution Vulnerability Important 7.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43590 Visual C++ Redistributable Installer Elevation of Privilege Vulnerability Important 7.8 No No No An attacker who successfully exploited this vulnerability could create or delete files in the security context of the “NT AUTHORITY\ LOCAL SERVICE” account. Elevation of Privilege Exploitation Less Likely
CVE-2024-43616 Microsoft Office Remote Code Execution Vulnerability Important 7.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43584 Windows Scripting Engine Security Feature Bypass Vulnerability Important 7.7 No No No The Anti-Malware Scanning Interface implementation in the newer jscript9legacy.dll is not enabled when running in cscript/wscript leading to a bypass. Security Feature Bypass Exploitation Less Likely
CVE-2024-38029 Microsoft OpenSSH for Windows Remote Code Execution Vulnerability Important 7.5 No No No An attacker could remotely load a malicious DLL onto a machine where the ssh-agent service is launched with the -Oallow-remote-pkcs11 option, which could lead to remote code execution.

This vulnerability arises because the ssh-pkcs11-helper.exe is configured to allow remote DLL loading, which is not intended for arbitrary remote libraries but rather for pkcs providers already present on the remote machine.
Remote Code Execution Exploitation Less Likely
CVE-2024-38129 Windows Kerberos Elevation of Privilege Vulnerability Important 7.5 No No No An attacker who successfully exploited this vulnerability could gain domain administrator privileges Elevation of Privilege Exploitation Less Likely
CVE-2024-38149 BranchCache Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-38262 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability Important 7.5 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43483 .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43484 .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43485 .NET and Visual Studio Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43506 BranchCache Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43515 Internet Small Computer Systems Interface (iSCSI) Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43521 Windows Hyper-V Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43541 Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43544 Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43545 Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43562 Windows Network Address Translation (NAT) Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43565 Windows Network Address Translation (NAT) Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43567 Windows Hyper-V Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43575 Windows Hyper-V Denial of Service Vulnerability Important 7.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43550 Windows Secure Channel Spoofing Vulnerability Important 7.4 No No No   Spoofing Exploitation Less Likely
CVE-2024-43553 NT OS Kernel Elevation of Privilege Vulnerability Important 7.4 No No No An attacker who successfully exploited this vulnerability could gain Kernel Memory Access. Elevation of Privilege Exploitation Less Likely
CVE-2024-43529 Windows Print Spooler Elevation of Privilege Vulnerability Important 7.3 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-43552 Windows Shell Remote Code Execution Vulnerability Important 7.3 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43502 Windows Kernel Elevation of Privilege Vulnerability Important 7.1 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation More Likely
CVE-2024-43581 Microsoft OpenSSH for Windows Remote Code Execution Vulnerability Important 7.1 No No No   Remote Code Execution Exploitation More Likely
CVE-2024-43601 Visual Studio Code for Linux Remote Code Execution Vulnerability Important 7.1 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43615 Microsoft OpenSSH for Windows Remote Code Execution Vulnerability Important 7.1 No No No   Remote Code Execution Exploitation More Likely
CVE-2024-43511 Windows Kernel Elevation of Privilege Vulnerability Important 7.0 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-43522 Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability Important 7.0 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-43535 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability Important 7.0 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-43612 Power BI Report Server Spoofing Vulnerability Important 6.9 No No No Scope = Changed, Jump Point = True

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.
Spoofing Exploitation Less Likely
CVE-2024-43523 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43524 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43525 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43526 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-43536 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No No An attacker needs physical access to the target computer to plug in a malicious USB drive. Remote Code Execution Exploitation Less Likely
CVE-2024-43543 Windows Mobile Broadband Driver Remote Code Execution Vulnerability Important 6.8 No No No   Remote Code Execution Exploitation Less Likely
CVE-2024-37976 Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability Important 6.7 No No No An attacker who successfully exploited this vulnerability could bypass Secure Boot. Security Feature Bypass Exploitation Less Likely
CVE-2024-37979 Windows Kernel Elevation of Privilege Vulnerability Important 6.7 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-37982 Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability Important 6.7 No No No An attacker who successfully exploited this vulnerability could bypass Secure Boot. Security Feature Bypass Exploitation Less Likely
CVE-2024-37983 Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability Important 6.7 No No No An attacker who successfully exploited this vulnerability could bypass Secure Boot. Security Feature Bypass Exploitation Less Likely
CVE-2024-43481 Power BI Report Server Spoofing Vulnerability Important 6.5 No No No   Spoofing Exploitation Less Likely
CVE-2024-43512 Windows Standards-Based Storage Management Service Denial of Service Vulnerability Important 6.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43534 Windows Graphics Component Information Disclosure Vulnerability Important 6.5 No No No An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Information Disclosure Exploitation Less Likely
CVE-2024-43537 Windows Mobile Broadband Driver Denial of Service Vulnerability Important 6.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43538 Windows Mobile Broadband Driver Denial of Service Vulnerability Important 6.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43540 Windows Mobile Broadband Driver Denial of Service Vulnerability Important 6.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43542 Windows Mobile Broadband Driver Denial of Service Vulnerability Important 6.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43547 Windows Kerberos Information Disclosure Vulnerability Important 6.5 No No No   Information Disclosure Exploitation Less Likely
CVE-2024-43555 Windows Mobile Broadband Driver Denial of Service Vulnerability Important 6.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43557 Windows Mobile Broadband Driver Denial of Service Vulnerability Important 6.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43558 Windows Mobile Broadband Driver Denial of Service Vulnerability Important 6.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43559 Windows Mobile Broadband Driver Denial of Service Vulnerability Important 6.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43561 Windows Mobile Broadband Driver Denial of Service Vulnerability Important 6.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43609 Microsoft Office Spoofing Vulnerability Important 6.5 No No No   Spoofing Exploitation More Likely
CVE-2024-43513 BitLocker Security Feature Bypass Vulnerability Important 6.4 No No No   Security Feature Bypass Exploitation Less Likely
CVE-2024-43570 Windows Kernel Elevation of Privilege Vulnerability Important 6.4 No No No An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Elevation of Privilege Exploitation Less Likely
CVE-2024-43604 Outlook for Android Elevation of Privilege Vulnerability Important 5.7 No No No   Elevation of Privilege Exploitation Less Likely
CVE-2024-43546 Windows Cryptographic Information Disclosure Vulnerability Important 5.6 No No No Scope = Changed, Jump Point = True

An attacker who successfully exploited this vulnerability could potentially execute a cross-VM attack, thereby compromising multiple virtual machines and expanding the impact of the attack beyond the initially targeted VM.
Information Disclosure Exploitation Less Likely
CVE-2024-43571 Sudo for Windows Spoofing Vulnerability Important 5.6 No No No   Spoofing Exploitation Less Likely
CVE-2024-43500 Windows Resilient File System (ReFS) Information Disclosure Vulnerability Important 5.5 No No No   Information Disclosure Exploitation Less Likely
CVE-2024-43508 Windows Graphics Component Information Disclosure Vulnerability Important 5.5 No No No An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Information Disclosure Exploitation Less Likely
CVE-2024-43554 Windows Kernel-Mode Driver Information Disclosure Vulnerability Important 5.5 No No No The vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory. Information Disclosure Exploitation Less Likely
CVE-2024-43585 Code Integrity Guard Security Feature Bypass Vulnerability Important 5.5 No No An attacker must have existing access to the target file prior to exploitation.   Security Feature Bypass Exploitation Less Likely
CVE-2024-43603 Visual Studio Collector Service Denial of Service Vulnerability Important 5.5 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43614 Microsoft Defender for Endpoint for Linux Spoofing Vulnerability Important 5.5 No No No   Spoofing Exploitation Less Likely
CVE-2024-43520 Windows Kernel Denial of Service Vulnerability Moderate 5.0 No No No   Denial of Service Exploitation Less Likely
CVE-2024-43456 Windows Remote Desktop Services Tampering Vulnerability Important 4.8 No No No   Tampering Exploitation Less Likely


 

Do you need help keeping up patches? Syxsense’s automated patch management capabilities helps enterprises patch faster and more accurately. Schedule a consultation with us to learn how we can help you.