Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
MicrosoftGitHub CVE-2024-49063 Microsoft/Muzic Remote Code Execution Vulnerability
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42237 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42083 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42078 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-43853 Unknown
cna@python.orgMariner CVE-2024-11168 Unknown
security-advisories@github.comMariner CVE-2023-26484 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-46863 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-36481 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39291 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-38588 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-26933 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-41098 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42074 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39473 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42073 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39472 Unknown
support@hackerone.comMariner CVE-2023-46218 Unknown
secalert_us@oracle.comMariner CVE-2024-21127 Unknown
secalert_us@oracle.comMariner CVE-2024-21096 Unknown
secalert_us@oracle.comMariner CVE-2024-21130 Unknown
secalert_us@oracle.comMariner CVE-2024-21157 Unknown
secalert_us@oracle.comMariner CVE-2024-21129 Unknown
secalert_us@oracle.comMariner CVE-2024-21171 Unknown
security-advisories@github.comMariner CVE-2024-29018 Unknown
security-advisories@github.comMariner CVE-2024-45296 Unknown
secalert@redhat.comMariner CVE-2024-7006 Unknown
security-advisories@github.comMariner CVE-2024-43800 Unknown
secalert@redhat.comMariner CVE-2024-31081 Unknown
security-advisories@github.comMariner CVE-2024-43374 Unknown
cve@mitre.orgMariner CVE-2024-48949 Unknown
security-advisories@github.comMariner CVE-2024-47764 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-38381 Unknown
cve@mitre.orgMariner CVE-2024-26458 Unknown
security-advisories@github.comMariner CVE-2024-43799 Unknown
secalert@redhat.comMariner CVE-2023-6277 Unknown
cna@python.orgMariner CVE-2024-8088 Unknown
security-advisories@github.comMariner CVE-2024-49761 Unknown
secalert@redhat.comMariner CVE-2024-31083 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-44974 Unknown
secalert@redhat.comMariner CVE-2024-31080 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42297 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42246 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-43892 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42228 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-43905 Unknown
f5sirt@f5.comMariner CVE-2024-7347 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-43897 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-43829 Unknown
security@google.comMariner CVE-2022-1055 Unknown
cve@mitre.orgMariner CVE-2023-52340 Unknown
secalert@redhat.comMariner CVE-2023-2253 Unknown
secalert@redhat.comMariner CVE-2024-3727 Unknown
cve@kernel.orgMariner CVE-2024-27397 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-26900 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2022-48841 Unknown
cve@kernel.orgMariner CVE-2024-26953 Unknown
security-officer@isc.orgMariner CVE-2023-4408 Unknown
secalert@redhat.comMariner CVE-2022-3854 Unknown
security-advisories@github.comMariner CVE-2024-31449 Unknown
secalert@redhat.comMariner CVE-2024-31082 Unknown
security-advisories@github.comMariner CVE-2024-28180 Unknown
security@golang.orgMariner CVE-2022-41717 Unknown
cve@mitre.orgMariner CVE-2021-28361 Unknown
security-advisories@github.comMariner CVE-2024-25620 Unknown
facts@wolfssl.comMariner CVE-2024-2881 Unknown
secalert@redhat.comMariner CVE-2023-40548 Unknown
facts@wolfssl.comMariner CVE-2024-5814 Unknown
secalert@redhat.comMariner CVE-2012-2677 Unknown
cve@mitre.orgMariner CVE-2023-42366 Unknown
facts@wolfssl.comMariner CVE-2024-1543 Unknown
secure@intel.comMariner CVE-2019-14584 Unknown
cve@mitre.orgMariner CVE-2024-32610 Unknown
facts@wolfssl.comMariner CVE-2024-1545 Unknown
facts@wolfssl.comMariner CVE-2023-6935 Unknown
secalert_us@oracle.comMariner CVE-2024-21239 Unknown
secalert_us@oracle.comMariner CVE-2024-21241 Unknown
cve@mitre.orgMariner CVE-2023-50495 Unknown
facts@wolfssl.comMariner CVE-2023-6936 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-50228 Unknown
cve@mitre.orgMariner CVE-2024-25431 Unknown
secalert@redhat.comMariner CVE-2023-40549 Unknown
secalert@redhat.comMariner CVE-2023-40551 Unknown
security-advisories@github.comMariner CVE-2024-49767 Unknown
secalert@redhat.comMariner CVE-2023-40546 Unknown
cve@kernel.orgMariner CVE-2024-27418 Unknown
security@php.netMariner CVE-2024-11233 Unknown
security@apache.orgMariner CVE-2024-47554 Unknown
security@php.netMariner CVE-2024-11234 Unknown
secalert@redhat.comMariner CVE-2024-9355 Unknown
cve@mitre.orgMariner CVE-2024-31852 Unknown
facts@wolfssl.comMariner CVE-2024-5288 Unknown
facts@wolfssl.comMariner CVE-2023-6937 Unknown
psirt@nvidia.comMariner CVE-2024-0134 Unknown
security@ubuntu.comMariner CVE-2022-28737 Unknown
security@ubuntu.comMariner CVE-2022-4968 Unknown
facts@wolfssl.comMariner CVE-2024-5991 Unknown
secalert_us@oracle.comMariner CVE-2024-21237 Unknown
secalert_us@oracle.comMariner CVE-2024-21236 Unknown
secalert_us@oracle.comMariner CVE-2024-21218 Unknown
secalert_us@oracle.comMariner CVE-2024-21230 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2024-7264 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-26908 Unknown
secalert_us@oracle.comMariner CVE-2024-21231 Unknown
secalert_us@oracle.comMariner CVE-2024-21247 Unknown
secalert_us@oracle.comMariner CVE-2024-21193 Unknown
secalert_us@oracle.comMariner CVE-2024-21207 Unknown
secalert_us@oracle.comMariner CVE-2024-21160 Unknown
secalert_us@oracle.comMariner CVE-2024-21173 Unknown
secalert_us@oracle.comMariner CVE-2024-21212 Unknown
secalert_us@oracle.comMariner CVE-2024-21213 Unknown
secalert_us@oracle.comMariner CVE-2024-21199 Unknown
secalert_us@oracle.comMariner CVE-2024-21201 Unknown
secalert_us@oracle.comMariner CVE-2024-21163 Unknown
secalert_us@oracle.comMariner CVE-2024-21194 Unknown
secalert_us@oracle.comMariner CVE-2024-21162 Unknown
secalert_us@oracle.comMariner CVE-2024-21165 Unknown
secalert_us@oracle.comMariner CVE-2024-21238 Unknown
secalert_us@oracle.comMariner CVE-2024-21197 Unknown
secalert_us@oracle.comMariner CVE-2024-21203 Unknown
secalert_us@oracle.comMariner CVE-2024-21196 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2024-2004 Unknown
secalert_us@oracle.comMariner CVE-2024-20996 Unknown
support@hackerone.comMariner CVE-2023-46219 Unknown
cve-coordination@google.comMariner CVE-2022-1941 Unknown
secalert_us@oracle.comMariner CVE-2024-21142 Unknown
secalert_us@oracle.comMariner CVE-2024-21159 Unknown
secalert_us@oracle.comMariner CVE-2024-21134 Unknown
secalert_us@oracle.comMariner CVE-2024-21125 Unknown
cve@mitre.orgMariner CVE-2023-52890 Unknown
security-advisories@github.comMariner CVE-2024-24806 Unknown
secalert_us@oracle.comMariner CVE-2024-21135 Unknown
secalert_us@oracle.comMariner CVE-2024-21166 Unknown
secalert_us@oracle.comMariner CVE-2024-21219 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39474 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-43884 Unknown
secalert_us@oracle.comMariner CVE-2024-21198 Unknown
security@php.netMariner CVE-2024-8932 Unknown
security@php.netMariner CVE-2024-8929 Unknown
security@php.netMariner CVE-2024-11236 Unknown
secalert@redhat.comMariner CVE-2023-40550 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2024-2398 Unknown
facts@wolfssl.comMariner CVE-2024-1544 Unknown
cve@mitre.orgMariner CVE-2024-30205 Unknown
security@google.comMariner CVE-2022-3474 Unknown
openssl-security@openssl.orgMariner CVE-2024-6119 Unknown
cve@mitre.orgMariner CVE-2024-33876 Unknown
secalert@redhat.comMariner CVE-2021-20277 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42072 Unknown
security@golang.orgMariner CVE-2023-45288 Unknown
cve@mitre.orgMariner CVE-2007-4559 Unknown
security-officer@isc.orgMariner CVE-2023-5517 Unknown
security@apache.orgMariner CVE-2024-38473 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-26913 Unknown
security-advisories@github.comMariner CVE-2024-45590 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-36477 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42075 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-44946 Unknown
security@golang.orgMariner CVE-2022-32149 Unknown
secalert@redhat.comMariner CVE-2021-3847 Unknown
security@apache.orgMariner CVE-2024-39884 Unknown
cve@mitre.orgMariner CVE-2023-31084 Unknown
security@apache.orgMariner CVE-2024-38472 Unknown
glibc-cna@sourceware.orgMariner CVE-2024-33602 Unknown
cve@mitre.orgMariner CVE-2024-29166 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2022-48788 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-38664 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39485 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42071 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39483 Unknown
security@apache.orgMariner CVE-2024-36387 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-26978 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-38577 Unknown
security-officer@isc.orgMariner CVE-2023-5679 Unknown
secalert@redhat.comMariner CVE-2022-3650 Unknown
security@golang.orgMariner CVE-2024-24786 Unknown
secalert@redhat.comMariner CVE-2023-1393 Unknown
security@hashicorp.comMariner CVE-2024-6104 Unknown
secalert@redhat.comMariner CVE-2020-27840 Unknown
secalert@redhat.comMariner CVE-2022-32746 Unknown
cve@mitre.orgMariner CVE-2024-31950 Unknown
cve@mitre.orgMariner CVE-2024-44070 Unknown
cve@mitre.orgMariner CVE-2024-31951 Unknown
cve@mitre.orgMariner CVE-2024-27913 Unknown
security@golang.orgMariner CVE-2023-3978 Unknown
cve@mitre.orgMariner CVE-2021-43565 Unknown
cve-assign@fb.comMariner CVE-2021-24032 Unknown
MicrosoftMicrosoft Defender for Endpoint CVE-2024-49057 Microsoft Defender for Endpoint on Android Spoofing Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-12053 Chromium: CVE-2024-12053 Type Confusion in V8
MicrosoftMicrosoft Edge (Chromium-based) CVE-2024-49041 Microsoft Edge (Chromium-based) Spoofing Vulnerability
MicrosoftMicrosoft Office ADV240002 Microsoft Office Defense in Depth Update
MicrosoftMicrosoft Office CVE-2024-49059 Microsoft Office Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office CVE-2024-43600 Microsoft Office Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office Access CVE-2024-49142 Microsoft Access Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2024-49069 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Publisher CVE-2024-49079 Input Method Editor (IME) Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2024-49064 Microsoft SharePoint Information Disclosure Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2024-49062 Microsoft SharePoint Information Disclosure Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2024-49068 Microsoft SharePoint Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2024-49070 Microsoft SharePoint Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Word CVE-2024-49065 Microsoft Office Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-49091 Windows Domain Name Service Remote Code Execution Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2024-49117 Windows Hyper-V Remote Code Execution Vulnerability
MicrosoftSystem Center Operations Manager CVE-2024-43594 System Center Operations Manager Elevation of Privilege Vulnerability
MicrosoftWindows Cloud Files Mini Filter Driver CVE-2024-49114 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2024-49088 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2024-49138 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2024-49090 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows File Explorer CVE-2024-49082 Windows File Explorer Information Disclosure Vulnerability
MicrosoftWindows IP Routing Management Snapin CVE-2024-49080 Windows IP Routing Management Snapin Remote Code Execution Vulnerability
MicrosoftWindows Kernel CVE-2024-49084 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel-Mode Drivers CVE-2024-49074 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
MicrosoftWindows LDAP - Lightweight Directory Access Protocol CVE-2024-49121 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
MicrosoftWindows LDAP - Lightweight Directory Access Protocol CVE-2024-49124 Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability
MicrosoftWindows LDAP - Lightweight Directory Access Protocol CVE-2024-49112 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
MicrosoftWindows LDAP - Lightweight Directory Access Protocol CVE-2024-49113 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
MicrosoftWindows LDAP - Lightweight Directory Access Protocol CVE-2024-49127 Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
MicrosoftWindows Local Security Authority Subsystem Service (LSASS) CVE-2024-49126 Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2024-49118 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2024-49122 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2024-49096 Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-49073 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-49077 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-49083 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-49092 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-49087 Windows Mobile Broadband Driver Information Disclosure Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-49110 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-49078 Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
MicrosoftWindows PrintWorkflowUserSvc CVE-2024-49095 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
MicrosoftWindows PrintWorkflowUserSvc CVE-2024-49097 Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
MicrosoftWindows Remote Desktop CVE-2024-49132 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2024-49115 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2024-49116 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2024-49123 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2024-49129 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2024-49075 Windows Remote Desktop Services Denial of Service Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2024-49128 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2024-49106 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2024-49108 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2024-49119 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Remote Desktop Services CVE-2024-49120 Windows Remote Desktop Services Remote Code Execution Vulnerability
MicrosoftWindows Resilient File System (ReFS) CVE-2024-49093 Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-49085 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-49086 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-49089 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-49125 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-49104 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-49102 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Task Scheduler CVE-2024-49072 Windows Task Scheduler Elevation of Privilege Vulnerability
MicrosoftWindows Virtualization-Based Security (VBS) Enclave CVE-2024-49076 Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
MicrosoftWindows Wireless Wide Area Network Service CVE-2024-49081 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
MicrosoftWindows Wireless Wide Area Network Service CVE-2024-49103 Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
MicrosoftWindows Wireless Wide Area Network Service CVE-2024-49111 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
MicrosoftWindows Wireless Wide Area Network Service CVE-2024-49109 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
MicrosoftWindows Wireless Wide Area Network Service CVE-2024-49101 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
MicrosoftWindows Wireless Wide Area Network Service CVE-2024-49094 Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
MicrosoftWindows Wireless Wide Area Network Service CVE-2024-49098 Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
MicrosoftWindows Wireless Wide Area Network Service CVE-2024-49099 Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
MicrosoftWmsRepair Service CVE-2024-49107 WmsRepair Service Elevation of Privilege Vulnerability

CVE-2024-43594 - System Center Operations Manager Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43594
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: System Center Operations Manager Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to have access to the location where the target file will be run. They would then need to plant a specific file that would be used as part of the exploitation.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Successful exploitation requires the victim to install an affected version of the product which would trigger the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43594
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
System Center Operations Manager (SCOM) 2019 Release Notes (Security Update) Important Elevation of Privilege None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.19.10652.0 Maybe None
System Center Operations Manager (SCOM) 2022 Release Notes (Security Update) Important Elevation of Privilege None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.22.10684.0 Maybe None
System Center Operations Manager (SCOM) 2025 Release Notes (Security Update) Important Elevation of Privilege None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.25.10132.0 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43594 R4nger & Zhiniang Peng


CVE-2024-49057 - Microsoft Defender for Endpoint on Android Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49057
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Defender for Endpoint on Android Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user must install and use a specially-crafted malicious application on their Android device.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49057
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Defender for Endpoint for Android Release Notes (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
1.0.7128.0101 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49057 Dimitrios Valsamaras with Microsoft


CVE-2024-49059 - Microsoft Office Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49059
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49059
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2016 (32-bit edition) 4475587 (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5478.1004 Maybe None
Microsoft Office 2016 (64-bit edition) 4475587 (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5478.1004 Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49059 Sandro Poppi


CVE-2024-49064 - Microsoft SharePoint Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49064
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is file content.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49064
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002659 (Security Update)
5002544 (Security Update)
Important Information Disclosure 5002654
5002501
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.5478.1000 Maybe None
Microsoft SharePoint Server 2019 5002657 (Security Update)
5002664 (Security Update)
Important Information Disclosure 5002650
5002422
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.10416.20026 Yes
Maybe
None
Microsoft SharePoint Server Subscription Edition 5002658 (Security Update) Important Information Disclosure 5002651 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.17928.20290 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49064 Felix Boulet


CVE-2024-49068 - Microsoft SharePoint Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49068
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain the privileges of the compromised user.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to a high loss of confidentiality (C:H), and some loss of integrity (I:L) and no loss of availability (A:N). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could view sensitive information, a token in this scenario (Confidentiality), and make some changes to disclosed information (Integrity), but they would not be able to affect Availability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49068
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002659 (Security Update)
5002544 (Security Update)
Important Elevation of Privilege 5002654
5002501
Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
16.0.5478.1000 Maybe None
Microsoft SharePoint Server 2019 5002657 (Security Update)
5002664 (Security Update)
Important Elevation of Privilege 5002650
5002422
Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
16.0.10416.20026 Yes
Maybe
None
Microsoft SharePoint Server Subscription Edition 5002658 (Security Update) Important Elevation of Privilege 5002651 Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C
16.0.17928.20290 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49068

CVE-2024-49069 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49069
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


How could an attacker exploit this vulnerability?

An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through convincing a user to open a malicious document at which point the attacker could execute arbitrary code in the context of the user.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user needs to be tricked into opening malicious files.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49069
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Excel 2016 (32-bit edition) 5002660 (Security Update) Important Remote Code Execution 5002653 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5478.1002 Maybe None
Microsoft Excel 2016 (64-bit edition) 5002660 (Security Update) Important Remote Code Execution 5002653 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5478.1002 Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.92.24120731 Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.92.24120731 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49069 boolgombear


Jmini


CVE-2024-49070 - Microsoft SharePoint Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49070
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49070
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002659 (Security Update)
5002544 (Security Update)
Important Remote Code Execution 5002654
5002501
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5478.1000 Maybe None
Microsoft SharePoint Server 2019 5002657 (Security Update)
5002664 (Security Update)
Important Remote Code Execution 5002650
5002422
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10416.20026 Yes
Maybe
None
Microsoft SharePoint Server Subscription Edition 5002658 (Security Update) Important Remote Code Execution 5002651 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.17928.20290 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49070 zcgonvh


CVE-2024-49073 - Windows Mobile Broadband Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49073
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?

An attacker needs physical access to the target computer to plug in a malicious USB drive.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49073
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49073 Zhihua Wen with CyberKunLun


CVE-2024-49074 - Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49074
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49074
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49074 diversenok


CVE-2024-49084 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49084
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49084
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Elevation of Privilege 5046665 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Elevation of Privilege 5046665 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Elevation of Privilege 5046687
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Elevation of Privilege 5046687
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Elevation of Privilege 5046697 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Elevation of Privilege 5046697 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Elevation of Privilege 5046682 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Elevation of Privilege 5046682 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49084 Anonymous


CVE-2024-49085 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49085
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49085
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Remote Code Execution 5046618 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49085 Anonymous


CVE-2024-49086 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49086
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49086
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Remote Code Execution 5046618 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49086 Anonymous


CVE-2024-49087 - Windows Mobile Broadband Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49087
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.6/TemporalScore:4.0
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.


According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?

An attacker needs physical access to the target computer to plug in a malicious USB drive.


According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?

An attacker needs physical access to the target computer to plug in a malicious USB drive.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49087
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Information Disclosure 5046633
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Information Disclosure 5046633
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Information Disclosure
5046633
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Information Disclosure
5046633
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Information Disclosure
5046617
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Information Disclosure
5046617
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Information Disclosure 5046618 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Information Disclosure Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Information Disclosure Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49087 Zhihua Wen with CyberKunLun


CVE-2024-49089 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49089
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

To successfully exploit this vulnerability, an attacker or the targeted user would need to achieve a high level of control over a machine, as the attack requires access to processes typically restricted from average users.

Essentially, the exploitation necessitates elevated privileges on the compromised machine due to the requirement of manipulating processes beyond the reach of standard user permissions.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49089
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Remote Code Execution 5046665 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Remote Code Execution 5046665 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Remote Code Execution 5046633
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Remote Code Execution 5046633
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Remote Code Execution
5046633
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Remote Code Execution
5046633
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Remote Code Execution
5046617
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Remote Code Execution
5046617
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Remote Code Execution 5046618 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49089 Anonymous


CVE-2024-49091 - Windows Domain Name Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49091
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Domain Name Service Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49091
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Remote Code Execution 5046618 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49091 luckyu


CVE-2024-49092 - Windows Mobile Broadband Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49092
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?

An attacker needs physical access to the target computer to plug in a malicious USB drive.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49092
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49092 Zhihua Wen with CyberKunLun


CVE-2024-49093 - Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49093
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49093
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49093 Anonymous


CVE-2024-49094 - Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49094
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49094
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49094 Zhihua Wen with CyberKunLun


CVE-2024-49096 - Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49096
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49096
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Denial of Service 5046665 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Denial of Service 5046665 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Denial of Service 5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Denial of Service 5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Denial of Service
5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Denial of Service
5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Denial of Service
5046617
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Denial of Service
5046617
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Denial of Service 5046661
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Denial of Service 5046661
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Denial of Service 5046661
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Denial of Service 5046661
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Denial of Service 5046687
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Denial of Service 5046687
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Denial of Service 5046697 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Denial of Service 5046697 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Denial of Service 5046682 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Denial of Service 5046682 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Denial of Service 5046616

5046698
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Denial of Service 5046616

5046698
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Denial of Service 5046618 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Denial of Service Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Denial of Service Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49096 Azure Yang with Kunlun Lab


CVE-2024-49097 - Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49097
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49097
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49097 Jongseong Kim (nevul37) with Ajou University


Hyeongseok Jang (rotiple)


CVE-2024-49098 - Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49098
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?

An attacker needs physical access to the target computer to plug in a malicious USB drive.


What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain kernel memory content.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49098
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Information Disclosure 5046633
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Information Disclosure 5046633
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Information Disclosure
5046633
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Information Disclosure
5046633
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Information Disclosure
5046617
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Information Disclosure
5046617
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Information Disclosure 5046618 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Information Disclosure Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Information Disclosure Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49098 Zhihua Wen with CyberKunLun


CVE-2024-49099 - Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49099
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain kernel memory content.


According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?

An attacker needs physical access to the target computer to plug in a malicious USB drive.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49099
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Information Disclosure 5046633
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Information Disclosure 5046633
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Information Disclosure
5046633
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Information Disclosure
5046633
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Information Disclosure
5046617
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Information Disclosure
5046617
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Information Disclosure 5046618 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Information Disclosure Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Information Disclosure Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49099 Zhihua Wen with CyberKunLun


CVE-2024-49101 - Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49101
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49101
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49101 Zhihua Wen with CyberKunLun


CVE-2024-49102 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49102
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49102
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Remote Code Execution 5046665 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Remote Code Execution 5046665 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Remote Code Execution 5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Remote Code Execution 5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Remote Code Execution
5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Remote Code Execution
5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Remote Code Execution
5046617
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Remote Code Execution
5046617
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Remote Code Execution 5046618 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49102 Anonymous


CVE-2024-49103 - Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49103
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain kernel memory content.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49103
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Information Disclosure 5046633
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Information Disclosure 5046633
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Information Disclosure
5046633
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Information Disclosure
5046633
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Information Disclosure
5046617
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Information Disclosure
5046617
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Information Disclosure 5046615
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Information Disclosure 5046618 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Information Disclosure Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Information Disclosure Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49103 Zhihua Wen with CyberKunLun


CVE-2024-49104 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49104
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49104
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Remote Code Execution 5046665 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Remote Code Execution 5046665 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Remote Code Execution 5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Remote Code Execution 5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Remote Code Execution
5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Remote Code Execution
5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Remote Code Execution
5046617
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Remote Code Execution
5046617
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Remote Code Execution 5046618 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49104 Anonymous


CVE-2024-49106 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49106
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49106
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49106 k0shl with Kunlun Lab


VictorV(Tang tianwen) with Kunlun Lab


CVE-2024-49107 - WmsRepair Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49107
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: WmsRepair Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker would be able to delete any system files.


According to the CVSS metric, user interaction is required (UI:R) and privileges required  is low (PR:L). What does that mean for this vulnerability?

An authorized attacker must send the user a malicious file and convince the user to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49107
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Elevation of Privilege 5046665 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Elevation of Privilege 5046665 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2016 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49107 BochengXiang(@Crispr) with FDU


Minghao Lin


CVE-2024-49108 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49108
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49108
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49108 VictorV(Tang tianwen) with Kunlun Lab


CVE-2024-49111 - Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49111
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an attacker needs physical access to the victim's machine.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49111
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49111 Zhihua Wen with CyberKunLun


CVE-2024-49115 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49115
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49115
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49115 k0shl with Kunlun Lab


CVE-2024-49117 - Windows Hyper-V Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49117
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How would an attacker exploit this vulnerability?

This vulnerability would require an authenticated attacker on a guest VM to send specially crafted file operation requests on the VM to hardware resources on the VM which could result in remote code execution on the host server.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. The vulnerable endpoint is only available over the local VM interface as all external communication is blocked. This means an attacker needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An attacker who successfully exploited this vulnerability could potentially execute a cross-VM attack, thereby compromising multiple virtual machines and expanding the impact of the attack beyond the initially targeted VM.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49117
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49117 Agustin Toribio Moreno with Microsoft


CVE-2024-49119 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49119
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49119
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49119 VictorV(Tang tianwen) with Kunlun Lab


SmallerDragon


CVE-2024-49120 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49120
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49120
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49120 VictorV(Tang tianwen) with Kunlun Lab


CVE-2024-49121 - Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49121
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49121
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Denial of Service 5046665 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Denial of Service 5046665 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Denial of Service 5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Denial of Service 5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Denial of Service
5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Denial of Service
5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Denial of Service
5046617
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Denial of Service
5046617
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Denial of Service 5046661
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Denial of Service 5046661
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Denial of Service 5046661
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Denial of Service 5046661
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Denial of Service 5046687
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Denial of Service 5046687
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Denial of Service 5046697 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Denial of Service 5046697 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Denial of Service 5046682 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Denial of Service 5046682 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Denial of Service 5046616

5046698
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Denial of Service 5046616

5046698
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Denial of Service 5046618 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Denial of Service Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Denial of Service Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49121 Yuki Chen


CVE-2024-49122 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49122
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit the vulnerability?

To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. This could result in remote code execution on the server side.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49122
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Critical Remote Code Execution 5046665 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Critical Remote Code Execution 5046665 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Critical Remote Code Execution 5046687
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Critical Remote Code Execution 5046687
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49122 Azure Yang with Kunlun Lab


CVE-2024-49123 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49123
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49123
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49123 k0shl with Kunlun Lab


CVE-2024-49124 - Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49124
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An unauthenticated attacker could send a specially crafted request to a vulnerable server. Successful exploitation could result in the attacker's code running in the context of the SYSTEM account.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49124
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Critical Remote Code Execution 5046665 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Critical Remote Code Execution 5046665 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Critical Remote Code Execution 5046687
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Critical Remote Code Execution 5046687
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49124 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-49125 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49125
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49125
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Remote Code Execution 5046618 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49125 Nirmala Nawale with Microsoft


Anonymous


CVE-2024-49126 - Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49126
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, the attack vector is network (AV:N), privilege required is none (PR:N), and user interaction is none (UI:N). What is the target used in the context of the remote code execution?

The attacker for this vulnerability could target the server accounts in an arbitrary or remote code execution and attempt to trigger malicious code in the context of the server's account through a network call. The attacker needs no privileges nor does the user need to perform any action.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49126
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Critical Remote Code Execution 5046665 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Critical Remote Code Execution 5046665 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Critical Remote Code Execution 5046687
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Critical Remote Code Execution 5046687
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49126 Yuki Chen


CVE-2024-49129 - Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49129
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit the vulnerability?

An unauthenticated attacker could exploit the vulnerability by connecting to a Remote Desktop server and then sending a malicious http request to the server.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49129
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5048699 (Monthly Rollup) Important Denial of Service 5046697 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Denial of Service 5046697 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Denial of Service 5046682 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Denial of Service 5046682 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Denial of Service 5046616

5046698
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Denial of Service 5046616

5046698
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Denial of Service 5046618 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Denial of Service Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Denial of Service Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49129 k0shl with Kunlun Lab




CVE-2024-49132 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49132
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49132
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49132 Jose Polo Bolano with Microsoft


VictorV(Tang tianwen) with Kunlun Lab


CVE-2024-49142 - Microsoft Access Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49142
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Access Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user needs to be tricked into opening malicious files.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49142
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Access 2016 (32-bit edition) 5002641 (Security Update) Important Remote Code Execution 4504711 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5478.1004 Maybe None
Microsoft Access 2016 (64-bit edition) 5002641 (Security Update) Important Remote Code Execution 4504711 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5478.1004 Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49142

CVE-2024-12053 - Chromium: CVE-2024-12053 Type Confusion in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-12053
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-12053 Type Confusion in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
131.0.2903.86 12/05/2024 131.0.6778.108/.109

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-12053
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
131.0.2903.86 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-12053 None

ADV240002 - Microsoft Office Defense in Depth Update

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
ADV240002
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Defense in Depth Update
CVSS:
None
Executive Summary:

Microsoft has released an update for Microsoft Office that provides enhanced security as a defense in depth measure.


FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Moderate Defense in Depth

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

ADV240002
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Project 2016 (32-bit edition) 5002652 (Security Update) Moderate Defense in Depth 5002561 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5478.1000 Maybe None
Microsoft Project 2016 (64-bit edition) 5002652 (Security Update) Moderate Defense in Depth 5002561 Base: N/A
Temporal: N/A
Vector: N/A
16.0.5478.1000 Maybe None

Acknowledgements

CVE ID Acknowledgements
ADV240002 None

CVE-2024-43600 - Microsoft Office Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43600
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43600
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Office 2016 (32-bit edition) 5002661 (Security Update)
2920716 (Security Update)
4475587 (Security Update)
Important Elevation of Privilege 5002642
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5478.1000
16.0.5478.1004
Maybe None
Microsoft Office 2016 (64-bit edition) 5002661 (Security Update)
2920716 (Security Update)
4475587 (Security Update)
Important Elevation of Privilege 5002642
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5478.1000
16.0.5478.1004
Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43600 @sim0nsecurity


CVE-2024-49062 - Microsoft SharePoint Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49062
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is file content.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49062
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002659 (Security Update)
5002544 (Security Update)
Important Information Disclosure 5002654
5002501
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.5478.1000 Maybe None
Microsoft SharePoint Server 2019 5002657 (Security Update)
5002664 (Security Update)
Important Information Disclosure 5002650
5002422
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.10416.20026 Yes
Maybe
None
Microsoft SharePoint Server Subscription Edition 5002658 (Security Update) Important Information Disclosure 5002651 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.17928.20290 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49062 Markus Wulftange with CODE WHITE GmbH


CVE-2024-49063 - Microsoft/Muzic Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49063
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft/Muzic Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


How could an attacker exploit the vulnerability?

An attacker could craft a malicious payload that executes arbitrary code upon deserialization.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49063
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft/Muzic Release Notes (Security Update) Important Remote Code Execution None Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
196.0 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49063 CyFrA


CVE-2024-49065 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49065
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability does not impact confidentiality (C:N), or integrity (I:N), but has a high impact on availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability cannot access or modify any sensitive user data but can cause user data to become unavailable.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Is the Attachment Preview Pane an attack vector for this vulnerability?

Yes. The attachment Preview Pane that is accessed when a user clicks to preview an attached file is an attack vector; however, the email Preview Pane itself is not.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49065
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2024 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2024 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
16.92.24120731 Maybe None
Microsoft Office LTSC for Mac 2024 Release Notes (Security Update) Important Remote Code Execution None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
16.92.24120731 Maybe None
Microsoft SharePoint Enterprise Server 2016 5002659 (Security Update) Important Remote Code Execution 5002654 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
16.0.5478.1000 Maybe None
Microsoft SharePoint Server 2019 5002657 (Security Update) Important Remote Code Execution 5002650 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
16.0.10416.20026 Yes None
Microsoft Word 2016 (32-bit edition) 5002661 (Security Update) Important Remote Code Execution 5002642 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
16.0.5478.1000 Maybe None
Microsoft Word 2016 (64-bit edition) 5002661 (Security Update) Important Remote Code Execution 5002642 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
16.0.5478.1000 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49065 Quan Jin with DBAPPSecurity WeBin Lab


CVE-2024-49072 - Windows Task Scheduler Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49072
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Task Scheduler Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49072
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Elevation of Privilege 5046665 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Elevation of Privilege 5046665 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Elevation of Privilege 5046687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Elevation of Privilege 5046687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Elevation of Privilege 5046697 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Elevation of Privilege 5046697 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Elevation of Privilege 5046682 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Elevation of Privilege 5046682 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49072 Florian Schweins


CVE-2024-49075 - Windows Remote Desktop Services Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49075
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49075
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Denial of Service 5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Denial of Service 5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Denial of Service
5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Denial of Service
5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Denial of Service
5046617
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Denial of Service
5046617
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Denial of Service 5046616

5046698
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Denial of Service 5046616

5046698
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Denial of Service 5046618 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Denial of Service Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Denial of Service Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49075 k0shl with Kunlun Lab


CVE-2024-49076 - Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49076
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges would an attacker gain by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could load a non-Microsoft DLL into an enclave, potentially leading to code execution within the context of the target enclave.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49076
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49076 Alex Ionescu, working for Winsider Seminars & Solutions, Inc.


CVE-2024-49077 - Windows Mobile Broadband Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49077
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?

An attacker needs physical access to the target computer to plug in a malicious USB drive.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49077
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49077 Zhihua Wen with CyberKunLun


CVE-2024-49078 - Windows Mobile Broadband Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49078
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?

An attacker needs physical access to the target computer to plug in a malicious USB drive.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49078
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49078 Zhihua Wen with CyberKunLun


CVE-2024-49079 - Input Method Editor (IME) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49079
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Input Method Editor (IME) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49079
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Remote Code Execution 5046665 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Remote Code Execution 5046665 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Remote Code Execution 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Remote Code Execution 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Remote Code Execution
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Remote Code Execution
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Remote Code Execution
5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Remote Code Execution
5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2012 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Remote Code Execution 5046618 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49079 CHEN QINGYANG with Topsec Alpha Team


CVE-2024-49080 - Windows IP Routing Management Snapin Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49080
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49080
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Remote Code Execution 5046665 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Remote Code Execution 5046665 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Remote Code Execution 5046613 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Remote Code Execution 5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Remote Code Execution 5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Remote Code Execution
5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Remote Code Execution
5046633
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Remote Code Execution
5046617
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Remote Code Execution
5046617
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Remote Code Execution 5046661
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Remote Code Execution 5046687
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Remote Code Execution 5046697 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Remote Code Execution 5046682 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Remote Code Execution 5046612 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Remote Code Execution 5046615
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Remote Code Execution 5046616

5046698
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Remote Code Execution 5046618 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Remote Code Execution Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49080 Anonymous


CVE-2024-49081 - Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49081
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49081
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49081 Zhihua Wen with CyberKunLun


CVE-2024-49082 - Windows File Explorer Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49082
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows File Explorer Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of the user's folders and personal data.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires multiple conditions to be met, such as specific application behavior, user actions, manipulation of parameters passed to a function, and impersonation of an integrity level token.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Successful exploitation of this vulnerability requires the victim to perform a specific file management operation to trigger the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49082
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Information Disclosure 5046665 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Information Disclosure 5046665 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Information Disclosure 5046612 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Information Disclosure 5046612 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Information Disclosure 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Information Disclosure 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Information Disclosure 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Information Disclosure 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Information Disclosure 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Information Disclosure
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Information Disclosure
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Information Disclosure
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Information Disclosure
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Information Disclosure 5046661
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Information Disclosure 5046661
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Information Disclosure 5046661
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Information Disclosure 5046661
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Information Disclosure 5046687
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Information Disclosure 5046687
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Information Disclosure 5046697 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Information Disclosure 5046697 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Information Disclosure 5046682 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Information Disclosure 5046682 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Information Disclosure 5046612 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Information Disclosure 5046612 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Information Disclosure 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Information Disclosure 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Information Disclosure 5046616

5046698
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Information Disclosure 5046616

5046698
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Information Disclosure 5046618 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Information Disclosure Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49082 st4nly0n working with Trend Micro Zero Day Initiative


CVE-2024-49083 - Windows Mobile Broadband Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49083
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?

An attacker needs physical access to the target computer to plug in a malicious USB drive.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49083
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49083 Zhihua Wen with CyberKunLun


CVE-2024-49088 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49088
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49088
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Elevation of Privilege 5046665 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Elevation of Privilege 5046665 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048667 (Security Update)
5048794 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2605

10.0.26100.2528
Yes
No
5048667
Windows 11 Version 24H2 for x64-based Systems 5048667 (Security Update)
5048794 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2605

10.0.26100.2528
Yes
No
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Elevation of Privilege 5046687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Elevation of Privilege 5046687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Elevation of Privilege 5046697 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Elevation of Privilege 5046697 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Elevation of Privilege 5046682 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Elevation of Privilege 5046682 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49088 dkdfcd


CVE-2024-49090 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49090
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49090
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Elevation of Privilege 5046665 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Elevation of Privilege 5046665 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Elevation of Privilege 5046687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Elevation of Privilege 5046687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Elevation of Privilege 5046697 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Elevation of Privilege 5046697 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Elevation of Privilege 5046682 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Elevation of Privilege 5046682 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49090 luckyu


CVE-2024-49095 - Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49095
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level or a High Integrity Level.

Please refer to AppContainer isolation and Mandatory Integrity Control for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49095
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49095 Jongseong Kim (nevul37) with Ajou University


Hyeongseok Jang (rotiple)


CVE-2024-49109 - Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49109
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.8
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49109
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.6
Temporal: 5.8
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49109

CVE-2024-49110 - Windows Mobile Broadband Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49110
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the Attack Vector is Physical (AV:P). What does that mean for this vulnerability?

An attacker needs physical access to the target computer to plug in a malicious USB drive.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49110
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49110 Adel from MSRC V&M


CVE-2024-49112 - Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49112
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through a specially crafted set of LDAP calls to execute arbitrary code within the context of the LDAP service.


Mitigations:

Is there any action a customer can take to protect against this vulnerability if they are unable to apply the update?

Ensure that domain controllers are configured either to not access the internet or to not allow inbound RPC from untrusted networks. While either mitigation will protect your system from this vulnerability, we recommend applying both configurations to provide an effective defense-in-depth against this vulnerability.


Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49112
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Critical Remote Code Execution 5046665 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Critical Remote Code Execution 5046665 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Critical Remote Code Execution 5046687
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Critical Remote Code Execution 5046687
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49112 Yuki Chen


CVE-2024-49113 - Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49113
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49113
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Denial of Service 5046665 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Denial of Service 5046665 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Denial of Service 5046613 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Denial of Service 5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Denial of Service 5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Denial of Service
5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Denial of Service
5046633
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Denial of Service
5046617
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Denial of Service
5046617
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Denial of Service 5046661
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Denial of Service 5046661
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Denial of Service 5046661
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Denial of Service 5046661
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Denial of Service 5046687
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Denial of Service 5046687
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Denial of Service 5046697 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Denial of Service 5046697 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Denial of Service 5046682 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Denial of Service 5046682 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Denial of Service 5046612 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Denial of Service 5046615
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Denial of Service 5046616

5046698
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Denial of Service 5046616

5046698
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Denial of Service 5046618 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Denial of Service Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Denial of Service Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49113 Yuki Chen


CVE-2024-49114 - Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49114
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49114
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048667 (Security Update)
5048794 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2605

10.0.26100.2528
Yes
No
5048667
Windows 11 Version 24H2 for x64-based Systems 5048667 (Security Update)
5048794 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2605

10.0.26100.2528
Yes
No
5048667
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49114 Mateusz Jurczyk with Google Project Zero


CVE-2024-49116 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49116
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49116
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49116 VictorV(Tang tianwen) with Kunlun Lab


CVE-2024-49118 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49118
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition during the execution of a specific operation that recurs in a low frequency on the target system. This might require an attacker to invest a significant amount of time to exploit the vulnerability if the race condition is not won.


How could an attacker exploit the vulnerability?

To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. This could result in remote code execution on the server side.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49118
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Critical Remote Code Execution 5046665 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Critical Remote Code Execution 5046665 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Critical Remote Code Execution 5046687
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Critical Remote Code Execution 5046687
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49118 Azure Yang with Kunlun Lab


CVE-2024-49127 - Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49127
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


How could an attacker exploit this vulnerability?

An unauthenticated attacker could send a specially crafted request to a vulnerable server. Successful exploitation could result in the attacker's code running in the context of the SYSTEM account.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49127
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Critical Remote Code Execution 5046665 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Critical Remote Code Execution 5046665 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Critical Remote Code Execution 5046613 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution 5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Critical Remote Code Execution
5046633
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Critical Remote Code Execution
5046617
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Critical Remote Code Execution 5046661
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Critical Remote Code Execution 5046687
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Critical Remote Code Execution 5046687
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49127 Yuki Chen


CVE-2024-49128 - Windows Remote Desktop Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49128
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Desktop Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49128
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Critical Remote Code Execution 5046697 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Critical Remote Code Execution 5046682 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Critical Remote Code Execution 5046612 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Critical Remote Code Execution 5046615
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5046616

5046698
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Critical Remote Code Execution 5046618 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Critical Remote Code Execution Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49128 VictorV(Tang tianwen) with Kunlun Lab


CVE-2024-49138 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49138
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Dec-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected Yes Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49138
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5048703 (Security Update) Important Elevation of Privilege 5046665 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 for x64-based Systems 5048703 (Security Update) Important Elevation of Privilege 5046665 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20857 Yes None
Windows 10 Version 1607 for 32-bit Systems 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1607 for x64-based Systems 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows 10 Version 1809 for 32-bit Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 1809 for x64-based Systems 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows 10 Version 21H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 21H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.5247 Yes None
Windows 10 Version 22H2 for 32-bit Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for ARM64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 10 Version 22H2 for x64-based Systems 5048652 (Security Update) Important Elevation of Privilege 5046613 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19045.5247 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 22H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege 5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4602
Yes 5048685
Windows 11 Version 23H2 for ARM64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 23H2 for x64-based Systems 5048685 (Security Update) Important Elevation of Privilege
5046633
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.4602
Yes 5048685
Windows 11 Version 24H2 for ARM64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows 11 Version 24H2 for x64-based Systems 5048794 (SecurityHotpatchUpdate)
5048667 (Security Update)
Important Elevation of Privilege
5046617
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2605
No
Yes
5048667
Windows Server 2008 for 32-bit Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5048710 (Monthly Rollup)
5048744 (Security Only)
Important Elevation of Privilege 5046661
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.23016
Yes 5048710
5048744
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Elevation of Privilege 5046687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5048695 (Monthly Rollup)
5048676 (Security Only)
Important Elevation of Privilege 5046687
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27467 Yes None
Windows Server 2012 5048699 (Monthly Rollup) Important Elevation of Privilege 5046697 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 (Server Core installation) 5048699 (Monthly Rollup) Important Elevation of Privilege 5046697 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25222 Yes None
Windows Server 2012 R2 5048735 (Monthly Rollup) Important Elevation of Privilege 5046682 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2012 R2 (Server Core installation) 5048735 (Monthly Rollup) Important Elevation of Privilege 5046682 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22318 Yes None
Windows Server 2016 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2016 (Server Core installation) 5048671 (Security Update) Important Elevation of Privilege 5046612 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7606 Yes None
Windows Server 2019 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2019 (Server Core installation) 5048661 (Security Update) Important Elevation of Privilege 5046615
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6659
Yes 5048661
Windows Server 2022 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022 (Server Core installation) 5048654 (Security Update)
5048800 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5046616

5046698
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2966

10.0.20348.2908
Yes 5048654
Windows Server 2022, 23H2 Edition (Server Core installation) 5048653 (Security Update) Important Elevation of Privilege 5046618 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1308 Yes None
Windows Server 2025 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None
Windows Server 2025 (Server Core installation) 5048794 (SecurityHotpatchUpdate)
5048794 (Security Hotpatch Update)
Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.2528
10.0.26100.2520
No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49138 Advanced Research Team with CrowdStrike


CVE-2024-49041 - Microsoft Edge (Chromium-based) Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49041
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


What is the version information for this release?

Microsoft Edge Version Date Released Based on Chromium Version
131.0.2903.86 12/05/2024 131.0.6778.108/.109

Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Dec-24    

Information published.


Moderate Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49041
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Moderate Spoofing None Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
131.0.2903.86 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49041 Haifei Li with Check Point Research




Peter Girnus of Trend Micro Zero Day Initiative


Sazzad Mahmud Tomal


CVE-2023-45288 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-45288
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-24    

Information published.


1.0    20-Apr-24    

Information published.


1.0    30-Jun-24    

Information published.


1.0    02-Jul-24    

Information published.


1.0    12-Jul-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


1.0    15-Aug-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    17-Aug-24    

Information published.


1.0    18-Aug-24    

Information published.


1.0    19-Aug-24    

Information published.


1.0    20-Aug-24    

Information published.


1.0    21-Aug-24    

Information published.


1.0    22-Aug-24    

Information published.


1.0    23-Aug-24    

Information published.


1.0    24-Aug-24    

Information published.


1.0    25-Aug-24    

Information published.


1.0    26-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    13-Sep-24    

Information published.


1.0    14-Sep-24    

Information published.


1.0    15-Sep-24    

Information published.


1.0    16-Sep-24    

Information published.


1.0    17-Sep-24    

Information published.


1.0    18-Sep-24    

Information published.


1.0    19-Sep-24    

Information published.


1.0    20-Sep-24    

Information published.


1.0    21-Sep-24    

Information published.


1.0    22-Sep-24    

Information published.


1.0    23-Sep-24    

Information published.


1.0    24-Sep-24    

Information published.


1.0    25-Sep-24    

Information published.


1.0    26-Sep-24    

Information published.


1.0    27-Sep-24    

Information published.


1.0    28-Sep-24    

Information published.


1.0    29-Sep-24    

Information published.


1.0    30-Sep-24    

Information published.


1.0    01-Oct-24    

Information published.


1.0    02-Oct-24    

Information published.


1.0    03-Oct-24    

Information published.


1.0    04-Oct-24    

Information published.


1.0    05-Oct-24    

Information published.


1.0    06-Oct-24    

Information published.


1.0    07-Oct-24    

Information published.


1.0    09-Oct-24    

Information published.


1.0    10-Oct-24    

Information published.


1.0    11-Oct-24    

Information published.


1.0    12-Oct-24    

Information published.


1.0    13-Oct-24    

Information published.


1.0    14-Oct-24    

Information published.


2.0    15-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


3.0    16-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


4.0    17-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


5.0    18-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


6.0    19-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.0    20-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.0    21-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.0    22-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.0    23-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


11.0    24-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


12.0    25-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


13.0    26-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


14.0    27-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


15.0    28-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


16.0    29-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


17.0    30-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


18.0    31-Oct-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


19.0    01-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


20.0    02-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


21.0    04-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


22.0    05-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


23.0    06-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


24.0    07-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


25.0    08-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


26.0    09-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


27.0    10-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


28.0    11-Nov-24    

Added nmi to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


29.0    12-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


30.0    13-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


31.0    14-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


32.0    15-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


33.0    16-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


34.0    17-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


35.0    18-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


36.0    19-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


37.0    20-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


38.0    21-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


39.0    23-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


40.0    24-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


41.0    25-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


42.0    26-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


43.0    27-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


44.0    28-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


45.0    29-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


46.0    30-Nov-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


47.0    01-Dec-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


48.0    02-Dec-24    

Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


49.0    03-Dec-24    

Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added nmi to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


50.0    04-Dec-24    

Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added nmi to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


51.0    05-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


52.0    07-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


53.0    08-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


54.0    09-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


55.0    10-Dec-24    

Added nmi to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added blobfuse2 to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added coredns to CBL-Mariner 2.0 Added cri-tools to CBL-Mariner 2.0 Added etcd to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-containerd to CBL-Mariner 2.0 Added moby-containerd-cc to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added jx to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added helm to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-45288
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.25.1-1
2.3.0-1
1.12.12-1
1.11.1-2
None
Azure Linux 3.0 x64 azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.25.1-1
2.3.0-1
1.12.12-1
1.11.1-2
None
CBL Mariner 2.0 ARM azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.25.1-1
2.1.2-3
1.11.2-9
1.11.1-8
None
CBL Mariner 2.0 x64 azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.25.1-1
2.1.2-3
1.11.2-9
1.11.1-8
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-45288 None

CVE-2007-4559 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2007-4559
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    25-Sep-20    

Information published.


2.0    16-Dec-21    

Added python3 to CBL-Mariner 2.0


1.0    30-Jun-24    

Information published.


1.0    08-Jul-24    

Information published.


1.0    09-Jul-24    

Information published.


1.0    10-Jul-24    

Information published.


1.0    12-Jul-24    

Information published.


1.0    13-Jul-24    

Information published.


1.0    14-Jul-24    

Information published.


1.0    15-Jul-24    

Information published.


1.0    16-Jul-24    

Information published.


1.0    17-Jul-24    

Information published.


1.0    19-Jul-24    

Information published.


1.0    20-Jul-24    

Information published.


1.0    21-Jul-24    

Information published.


1.0    22-Jul-24    

Information published.


1.0    23-Jul-24    

Information published.


1.0    24-Jul-24    

Information published.


1.0    25-Jul-24    

Information published.


1.0    26-Jul-24    

Information published.


1.0    27-Jul-24    

Information published.


1.0    28-Jul-24    

Information published.


1.0    29-Jul-24    

Information published.


1.0    02-Aug-24    

Information published.


1.0    03-Aug-24    

Information published.


1.0    04-Aug-24    

Information published.


1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


1.0    15-Aug-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    17-Aug-24    

Information published.


1.0    18-Aug-24    

Information published.


1.0    19-Aug-24    

Information published.


1.0    20-Aug-24    

Information published.


1.0    21-Aug-24    

Information published.


1.0    22-Aug-24    

Information published.


1.0    23-Aug-24    

Information published.


1.0    24-Aug-24    

Information published.


1.0    25-Aug-24    

Information published.


1.0    26-Aug-24    

Information published.


1.0    27-Aug-24    

Information published.


1.0    28-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    12-Sep-24    

Information published.


1.0    13-Sep-24    

Information published.


1.0    14-Sep-24    

Information published.


1.0    15-Sep-24    

Information published.


1.0    16-Sep-24    

Information published.


1.0    17-Sep-24    

Information published.


1.0    18-Sep-24    

Information published.


1.0    19-Sep-24    

Information published.


1.0    20-Sep-24    

Information published.


1.0    21-Sep-24    

Information published.


1.0    22-Sep-24    

Information published.


1.0    23-Sep-24    

Information published.


1.0    24-Sep-24    

Information published.


1.0    25-Sep-24    

Information published.


1.0    26-Sep-24    

Information published.


1.0    27-Sep-24    

Information published.


1.0    28-Sep-24    

Information published.


1.0    29-Sep-24    

Information published.


1.0    30-Sep-24    

Information published.


1.0    01-Oct-24    

Information published.


1.0    02-Oct-24    

Information published.


1.0    03-Oct-24    

Information published.


1.0    04-Oct-24    

Information published.


1.0    05-Oct-24    

Information published.


1.0    06-Oct-24    

Information published.


1.0    07-Oct-24    

Information published.


1.0    08-Oct-24    

Information published.


1.0    09-Oct-24    

Information published.


1.0    10-Oct-24    

Information published.


1.0    11-Oct-24    

Information published.


1.0    12-Oct-24    

Information published.


1.0    13-Oct-24    

Information published.


1.0    14-Oct-24    

Information published.


3.0    15-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


4.0    16-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


5.0    17-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


6.0    18-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


7.0    19-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


8.0    20-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


9.0    21-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


10.0    22-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


11.0    23-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


12.0    24-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


13.0    25-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


14.0    26-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


15.0    27-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


16.0    28-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


17.0    29-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


18.0    30-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


19.0    31-Oct-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


20.0    01-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


21.0    02-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


22.0    04-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


23.0    05-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


24.0    06-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


25.0    07-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


26.0    08-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


27.0    09-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


28.0    10-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


29.0    11-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


30.0    12-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


31.0    13-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


32.0    14-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


33.0    15-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


34.0    16-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


35.0    17-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


36.0    18-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


37.0    19-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


38.0    20-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


39.0    21-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


40.0    23-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


41.0    24-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


42.0    25-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


43.0    26-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


44.0    27-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


45.0    28-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


46.0    29-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


47.0    30-Nov-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


48.0    01-Dec-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


49.0    02-Dec-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


50.0    03-Dec-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


51.0    04-Dec-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


52.0    05-Dec-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


53.0    07-Dec-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


54.0    08-Dec-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


55.0    09-Dec-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


56.0    10-Dec-24    

Added python3 to CBL-Mariner 2.0 Added python2 to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2007-4559
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
2.7.18-5 Unknown None
CBL Mariner 1.0 x64 python2 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
2.7.18-5 Unknown None
CBL Mariner 2.0 ARM python3 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
3.9.19-1 Unknown None
CBL Mariner 2.0 x64 python3 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
3.9.19-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2007-4559 None

CVE-2021-20277 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-20277
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    15-Oct-24    

Information published.


2.0    16-Oct-24    

Added samba to Azure Linux 3.0


3.0    17-Oct-24    

Added samba to Azure Linux 3.0


4.0    18-Oct-24    

Added samba to Azure Linux 3.0


5.0    19-Oct-24    

Added samba to Azure Linux 3.0


6.0    20-Oct-24    

Added samba to Azure Linux 3.0


7.0    21-Oct-24    

Added samba to Azure Linux 3.0


8.0    22-Oct-24    

Added samba to Azure Linux 3.0


9.0    23-Oct-24    

Added samba to Azure Linux 3.0


10.0    24-Oct-24    

Added samba to Azure Linux 3.0


11.0    25-Oct-24    

Added samba to Azure Linux 3.0


12.0    26-Oct-24    

Added samba to Azure Linux 3.0


13.0    27-Oct-24    

Added samba to Azure Linux 3.0


14.0    28-Oct-24    

Added samba to Azure Linux 3.0


15.0    29-Oct-24    

Added samba to Azure Linux 3.0


16.0    30-Oct-24    

Added samba to Azure Linux 3.0


17.0    31-Oct-24    

Added samba to Azure Linux 3.0


18.0    01-Nov-24    

Added samba to Azure Linux 3.0


19.0    02-Nov-24    

Added samba to Azure Linux 3.0


20.0    04-Nov-24    

Added samba to Azure Linux 3.0


21.0    05-Nov-24    

Added samba to Azure Linux 3.0


22.0    06-Nov-24    

Added samba to Azure Linux 3.0


23.0    07-Nov-24    

Added samba to Azure Linux 3.0


24.0    08-Nov-24    

Added samba to Azure Linux 3.0


25.0    09-Nov-24    

Added samba to Azure Linux 3.0


26.0    10-Nov-24    

Added samba to Azure Linux 3.0


27.0    11-Nov-24    

Added samba to Azure Linux 3.0


28.0    12-Nov-24    

Added samba to Azure Linux 3.0


29.0    13-Nov-24    

Added samba to Azure Linux 3.0


30.0    14-Nov-24    

Added samba to Azure Linux 3.0


31.0    15-Nov-24    

Added samba to Azure Linux 3.0


32.0    16-Nov-24    

Added samba to Azure Linux 3.0


33.0    17-Nov-24    

Added samba to Azure Linux 3.0


34.0    18-Nov-24    

Added samba to Azure Linux 3.0


35.0    19-Nov-24    

Added samba to Azure Linux 3.0


36.0    20-Nov-24    

Added samba to Azure Linux 3.0


37.0    21-Nov-24    

Added samba to Azure Linux 3.0


38.0    23-Nov-24    

Added samba to Azure Linux 3.0


39.0    24-Nov-24    

Added samba to Azure Linux 3.0


40.0    25-Nov-24    

Added samba to Azure Linux 3.0


41.0    26-Nov-24    

Added samba to Azure Linux 3.0


42.0    27-Nov-24    

Added samba to Azure Linux 3.0


43.0    28-Nov-24    

Added samba to Azure Linux 3.0


44.0    29-Nov-24    

Added samba to Azure Linux 3.0


45.0    30-Nov-24    

Added samba to Azure Linux 3.0


46.0    01-Dec-24    

Added samba to Azure Linux 3.0


47.0    02-Dec-24    

Added samba to Azure Linux 3.0


48.0    03-Dec-24    

Added samba to Azure Linux 3.0


49.0    04-Dec-24    

Added samba to Azure Linux 3.0


50.0    05-Dec-24    

Added samba to Azure Linux 3.0


51.0    07-Dec-24    

Added samba to Azure Linux 3.0


52.0    08-Dec-24    

Added samba to Azure Linux 3.0


53.0    09-Dec-24    

Added samba to Azure Linux 3.0


54.0    10-Dec-24    

Added samba to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-20277
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM samba (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.18.3-1 Unknown None
Azure Linux 3.0 x64 samba (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.18.3-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-20277 None

CVE-2022-3474 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-3474
MITRE
NVD

Issuing CNA: security@google.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    29-Oct-22    

Information published.


2.0    03-Dec-24    

Added bazel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-3474
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM bazel (CBL-Mariner) Unknown Unknown None Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
5.3.2-1 Unknown None
CBL Mariner 2.0 x64 bazel (CBL-Mariner) Unknown Unknown None Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
5.3.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-3474 None

CVE-2024-6119 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-6119
MITRE
NVD

Issuing CNA: openssl-security@openssl.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    25-Sep-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    15-Oct-24    

Added edk2 to Azure Linux 3.0 Added openssl to Azure Linux 3.0 Added cloud-hypervisor-cvm to Azure Linux 3.0 Added cloud-hypervisor-cvm to CBL-Mariner 2.0


3.0    28-Nov-24    

Added hvloader to CBL-Mariner 2.0 Added cloud-hypervisor-cvm to CBL-Mariner 2.0 Added edk2 to Azure Linux 3.0 Added openssl to Azure Linux 3.0 Added cloud-hypervisor-cvm to Azure Linux 3.0


4.0    03-Dec-24    

Added cloud-hypervisor-cvm to CBL-Mariner 2.0 Added hvloader to CBL-Mariner 2.0 Added edk2 to Azure Linux 3.0 Added openssl to Azure Linux 3.0 Added cloud-hypervisor-cvm to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-6119
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cloud-hypervisor-cvm (CBL-Mariner)
edk2 (CBL-Mariner)
openssl (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
38.0.72.2-2
20240524git3e722403cd16-3
3.3.2-1
None
Azure Linux 3.0 x64 cloud-hypervisor-cvm (CBL-Mariner)
edk2 (CBL-Mariner)
openssl (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
38.0.72.2-2
20240524git3e722403cd16-3
3.3.2-1
None
CBL Mariner 2.0 ARM cloud-hypervisor-cvm (CBL-Mariner)
hvloader (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
38.0.72.2-2
1.0.1-6
None
CBL Mariner 2.0 x64 cloud-hypervisor-cvm (CBL-Mariner)
hvloader (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
38.0.72.2-2
1.0.1-6
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-6119 None

CVE-2024-33876 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-33876
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


1.0    30-Jun-24    

Information published.


2.0    03-Dec-24    

Added hdf5 to CBL-Mariner 2.0 Added hdf5 to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-33876
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM hdf5 (CBL-Mariner) Unknown Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1.14.4.3-1 Unknown None
Azure Linux 3.0 x64 hdf5 (CBL-Mariner) Unknown Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1.14.4.3-1 Unknown None
CBL Mariner 2.0 ARM hdf5 (CBL-Mariner) Unknown Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1.14.4-1 Unknown None
CBL Mariner 2.0 x64 hdf5 (CBL-Mariner) Unknown Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1.14.4-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-33876 None

CVE-2024-36477 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-36477
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Jul-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-36477
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-4 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-4 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.160.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.160.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-36477 None

CVE-2024-42075 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42075
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42075
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42075 None

CVE-2024-44946 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-44946
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Oct-24    

Information published.


2.0    15-Oct-24    

Added kernel to Azure Linux 3.0 Added kernel to CBL-Mariner 2.0


3.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


4.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-44946
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.51.1-1 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.51.1-1 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-44946 None

CVE-2024-45590 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-45590
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    15-Oct-24    

Information published.


2.0    16-Oct-24    

Added reaper to CBL-Mariner 2.0 Added python-tensorboard to Azure Linux 3.0


3.0    25-Oct-24    

Added reaper to CBL-Mariner 2.0 Added python-tensorboard to Azure Linux 3.0


4.0    03-Dec-24    

Added reaper to CBL-Mariner 2.0 Added python-tensorboard to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-45590
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python-tensorboard (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.16.2-5 Unknown None
Azure Linux 3.0 x64 python-tensorboard (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.16.2-5 Unknown None
CBL Mariner 2.0 ARM reaper (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.1.1-13 Unknown None
CBL Mariner 2.0 x64 reaper (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.1.1-13 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-45590 None

CVE-2023-5517 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-5517
MITRE
NVD

Issuing CNA: security-officer@isc.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    19-Feb-24    

Information published.


1.0    30-Jun-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added bind to CBL-Mariner 2.0 Added bind to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-5517
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM bind (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.19.21-1 Unknown None
Azure Linux 3.0 x64 bind (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.19.21-1 Unknown None
CBL Mariner 2.0 ARM bind (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.16.48-1 Unknown None
CBL Mariner 2.0 x64 bind (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.16.48-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-5517 None

CVE-2024-38473 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38473
MITRE
NVD

Issuing CNA: security@apache.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:8.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    19-Jul-24    

Information published.


1.0    15-Aug-24    

Information published.


2.0    03-Dec-24    

Added httpd to CBL-Mariner 2.0 Added httpd to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38473
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM httpd (CBL-Mariner) Unknown Unknown None Base: 8.1
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
2.4.61-1 Unknown None
Azure Linux 3.0 x64 httpd (CBL-Mariner) Unknown Unknown None Base: 8.1
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
2.4.61-1 Unknown None
CBL Mariner 2.0 ARM httpd (CBL-Mariner) Unknown Unknown None Base: 8.1
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
2.4.61-1 Unknown None
CBL Mariner 2.0 x64 httpd (CBL-Mariner) Unknown Unknown None Base: 8.1
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
2.4.61-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38473 None

CVE-2024-26913 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26913
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Jul-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26913
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-4 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-4 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.160.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.160.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26913 None

CVE-2024-39474 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39474
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39474
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-5 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-5 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39474 None

CVE-2024-43884 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43884
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Oct-24    

Information published.


2.0    15-Oct-24    

Added kernel to Azure Linux 3.0 Added kernel to CBL-Mariner 2.0


3.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


4.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43884
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.51.1-5 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.51.1-5 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43884 None

CVE-2024-21198 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21198
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21198
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21198 None

CVE-2024-21219 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21219
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21219
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21219 None

CVE-2024-24806 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-24806
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:7.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Feb-24    

Information published.


2.0    15-Feb-24    

Added libuv to CBL-Mariner 2.0


1.0    30-Jun-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    05-Oct-24    

Information published.


3.0    04-Dec-24    

Added cmake to Azure Linux 3.0 Added python-gevent to Azure Linux 3.0 Added libuv to Azure Linux 3.0 Added nodejs to Azure Linux 3.0 Added libuv to CBL-Mariner 2.0 Added nodejs18 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-24806
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cmake (CBL-Mariner)
libuv (CBL-Mariner)
nodejs (CBL-Mariner)
python-gevent (CBL-Mariner)
Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
3.28.2-6
1.48.0-1
20.14.0-1
23.9.1-3
None
Azure Linux 3.0 x64 cmake (CBL-Mariner)
libuv (CBL-Mariner)
nodejs (CBL-Mariner)
python-gevent (CBL-Mariner)
Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
3.28.2-6
1.48.0-1
20.14.0-1
23.9.1-3
None
CBL Mariner 2.0 ARM libuv (CBL-Mariner)
nodejs18 (CBL-Mariner)
Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1.43.0-2
18.18.2-4
None
CBL Mariner 2.0 x64 libuv (CBL-Mariner)
nodejs18 (CBL-Mariner)
Unknown Unknown Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1.43.0-2
18.18.2-4
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-24806 None

CVE-2024-21135 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21135
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21135
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21135 None

CVE-2024-21166 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21166
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21166
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21166 None

CVE-2024-2398 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-2398
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.6/TemporalScore:8.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    01-Oct-24    

Information published.


1.0    05-Oct-24    

Information published.


2.0    23-Oct-24    

Added mysql to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0 Added cmake to Azure Linux 3.0 Added curl to Azure Linux 3.0


3.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added curl to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0


4.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added curl to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0


5.0    28-Nov-24    

Added cmake to CBL-Mariner 2.0 Added mysql to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0 Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added curl to Azure Linux 3.0


6.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added curl to Azure Linux 3.0 Added cmake to CBL-Mariner 2.0 Added mysql to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-2398
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
3.30.3-2
8.8.0-1
8.0.40-1
None
Azure Linux 3.0 x64 cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
3.30.3-2
8.8.0-1
8.0.40-1
None
CBL Mariner 2.0 ARM cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
3.21.4-14
8.8.0-1
8.0.40-1
None
CBL Mariner 2.0 x64 cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
3.21.4-14
8.8.0-1
8.0.40-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-2398 None

CVE-2024-1544 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-1544
MITRE
NVD

Issuing CNA: facts@wolfssl.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.1/TemporalScore:4.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-1544
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mariadb (CBL-Mariner) Unknown Unknown None Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
10.11.10-1 Unknown None
Azure Linux 3.0 x64 mariadb (CBL-Mariner) Unknown Unknown None Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
10.11.10-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-1544 None

CVE-2024-30205 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30205
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    30-Jun-24    

Information published.


2.0    07-Dec-24    

Added emacs to CBL-Mariner 2.0 Added emacs to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30205
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM emacs (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
29.3-1 Unknown None
Azure Linux 3.0 x64 emacs (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
29.3-1 Unknown None
CBL Mariner 2.0 ARM emacs (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
29.3-1 Unknown None
CBL Mariner 2.0 x64 emacs (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
29.3-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30205 None

CVE-2023-40550 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40550
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


2.0    07-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.0    08-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.0    09-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.0    10-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40550
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
15.8-3 None
Azure Linux 3.0 x64 shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
15.8-3 None
CBL Mariner 2.0 ARM shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
15.8-1 None
CBL Mariner 2.0 x64 shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
15.8-1 None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40550 None

CVE-2024-8932 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-8932
MITRE
NVD

Issuing CNA: security@php.net

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-8932
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM php (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1.31-1 Unknown None
CBL Mariner 2.0 x64 php (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1.31-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-8932 None

CVE-2024-8929 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-8929
MITRE
NVD

Issuing CNA: security@php.net

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.8/TemporalScore:5.8
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-8929
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM php (CBL-Mariner) Unknown Unknown None Base: 5.8
Temporal: 5.8
Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
8.1.31-1 Unknown None
CBL Mariner 2.0 x64 php (CBL-Mariner) Unknown Unknown None Base: 5.8
Temporal: 5.8
Vector: CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
8.1.31-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-8929 None

CVE-2024-11236 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-11236
MITRE
NVD

Issuing CNA: security@php.net

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-11236
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM php (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1.31-1 Unknown None
CBL Mariner 2.0 x64 php (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1.31-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-11236 None

CVE-2022-32149 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-32149
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Nov-23    

Information published.


2.0    24-Jan-24    

Added sriov-network-device-plugin to CBL-Mariner 2.0


1.0    30-Jun-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    13-Sep-24    

Information published.


1.0    19-Sep-24    

Information published.


1.0    20-Sep-24    

Information published.


1.0    21-Sep-24    

Information published.


1.0    22-Sep-24    

Information published.


1.0    23-Sep-24    

Information published.


1.0    24-Sep-24    

Information published.


1.0    25-Sep-24    

Information published.


1.0    26-Sep-24    

Information published.


1.0    27-Sep-24    

Information published.


1.0    28-Sep-24    

Information published.


1.0    29-Sep-24    

Information published.


1.0    30-Sep-24    

Information published.


1.0    01-Oct-24    

Information published.


1.0    02-Oct-24    

Information published.


1.0    03-Oct-24    

Information published.


1.0    04-Oct-24    

Information published.


1.0    05-Oct-24    

Information published.


1.0    06-Oct-24    

Information published.


1.0    07-Oct-24    

Information published.


1.0    08-Oct-24    

Information published.


1.0    09-Oct-24    

Information published.


1.0    11-Oct-24    

Information published.


1.0    12-Oct-24    

Information published.


1.0    13-Oct-24    

Information published.


1.0    14-Oct-24    

Information published.


3.0    15-Oct-24    

Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


4.0    16-Oct-24    

Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


5.0    17-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


6.0    18-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


7.0    19-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


8.0    20-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


9.0    21-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


10.0    22-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


11.0    23-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


12.0    24-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


13.0    25-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


14.0    26-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


15.0    27-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


16.0    28-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


17.0    29-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


18.0    30-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


19.0    31-Oct-24    

Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


20.0    01-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


21.0    02-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


22.0    04-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


23.0    05-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


24.0    06-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


25.0    07-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


26.0    08-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


27.0    09-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


28.0    10-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


29.0    11-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


30.0    12-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


31.0    13-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


32.0    14-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


33.0    15-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


34.0    16-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


35.0    17-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


36.0    18-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


37.0    19-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


38.0    20-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


39.0    21-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


40.0    23-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


41.0    24-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


42.0    25-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


43.0    26-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


44.0    27-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


45.0    28-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


46.0    29-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


47.0    30-Nov-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


48.0    01-Dec-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


49.0    02-Dec-24    

Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


50.0    03-Dec-24    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


51.0    04-Dec-24    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


52.0    05-Dec-24    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


53.0    07-Dec-24    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


54.0    08-Dec-24    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


55.0    09-Dec-24    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


56.0    10-Dec-24    

Added application-gateway-kubernetes-ingress to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cf-cli to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added git-lfs to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added kured to CBL-Mariner 2.0 Added cni to Azure Linux 3.0 Added multus to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-32149
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cni (CBL-Mariner)
keda (CBL-Mariner)
kubevirt (CBL-Mariner)
multus (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.1.2-3
2.14.0-1
1.2.0-1
4.0.2-1
None
Azure Linux 3.0 x64 cni (CBL-Mariner)
keda (CBL-Mariner)
kubevirt (CBL-Mariner)
multus (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.1.2-3
2.14.0-1
1.2.0-1
4.0.2-1
None
CBL Mariner 2.0 ARM application-gateway-kubernetes-ingress (CBL-Mariner)
cf-cli (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
gh (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.4.0-22
8.4.0-21
1.55.0-20
2.13.0-22
None
CBL Mariner 2.0 x64 application-gateway-kubernetes-ingress (CBL-Mariner)
cf-cli (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
gh (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.4.0-22
8.4.0-21
1.55.0-20
2.13.0-22
None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-32149 None

CVE-2024-6104 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-6104
MITRE
NVD

Issuing CNA: security@hashicorp.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    15-Aug-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    17-Aug-24    

Information published.


1.0    18-Aug-24    

Information published.


1.0    19-Aug-24    

Information published.


1.0    20-Aug-24    

Information published.


1.0    21-Aug-24    

Information published.


1.0    22-Aug-24    

Information published.


1.0    23-Aug-24    

Information published.


1.0    24-Aug-24    

Information published.


1.0    25-Aug-24    

Information published.


1.0    26-Aug-24    

Information published.


1.0    27-Aug-24    

Information published.


1.0    28-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    13-Sep-24    

Information published.


1.0    14-Sep-24    

Information published.


1.0    15-Sep-24    

Information published.


1.0    16-Sep-24    

Information published.


1.0    17-Sep-24    

Information published.


1.0    18-Sep-24    

Information published.


1.0    19-Sep-24    

Information published.


1.0    20-Sep-24    

Information published.


1.0    21-Sep-24    

Information published.


1.0    22-Sep-24    

Information published.


1.0    23-Sep-24    

Information published.


1.0    24-Sep-24    

Information published.


1.0    25-Sep-24    

Information published.


1.0    26-Sep-24    

Information published.


1.0    27-Sep-24    

Information published.


1.0    28-Sep-24    

Information published.


1.0    29-Sep-24    

Information published.


1.0    30-Sep-24    

Information published.


1.0    01-Oct-24    

Information published.


1.0    02-Oct-24    

Information published.


1.0    03-Oct-24    

Information published.


1.0    04-Oct-24    

Information published.


1.0    05-Oct-24    

Information published.


1.0    06-Oct-24    

Information published.


1.0    07-Oct-24    

Information published.


1.0    08-Oct-24    

Information published.


1.0    09-Oct-24    

Information published.


1.0    11-Oct-24    

Information published.


1.0    12-Oct-24    

Information published.


1.0    13-Oct-24    

Information published.


1.0    14-Oct-24    

Information published.


2.0    15-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


3.0    16-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


4.0    17-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


5.0    18-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


6.0    19-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


7.0    20-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


8.0    21-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


9.0    22-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


10.0    23-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


11.0    24-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


12.0    25-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


13.0    26-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


14.0    27-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


15.0    28-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


16.0    29-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


17.0    30-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


18.0    31-Oct-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


19.0    01-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


20.0    02-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


21.0    04-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


22.0    05-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


23.0    06-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


24.0    07-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


25.0    08-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


26.0    09-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


27.0    10-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


28.0    11-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


29.0    12-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


30.0    13-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


31.0    14-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


32.0    15-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


33.0    16-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


34.0    17-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


35.0    18-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


36.0    19-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


37.0    20-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


38.0    21-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


39.0    23-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


40.0    24-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


41.0    25-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


42.0    26-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


43.0    27-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


44.0    28-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


45.0    29-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


46.0    30-Nov-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


47.0    01-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


48.0    02-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


49.0    03-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


50.0    04-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


51.0    05-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


52.0    07-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


53.0    08-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


54.0    09-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


55.0    10-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added influxdb to CBL-Mariner 2.0 Added keda to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added rook to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added terraform to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added prometheus to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-6104
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libcontainers-common (CBL-Mariner)
cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
20240213-2
1.12.12-3
2.7.3-5
2.14.0-2
None
Azure Linux 3.0 x64 cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
libcontainers-common (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1.12.12-3
2.7.3-5
2.14.0-2
20240213-2
None
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
packer (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1.11.2-12
2.6.1-15
2.4.0-22
1.9.5-2
None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner)
influxdb (CBL-Mariner)
keda (CBL-Mariner)
packer (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1.11.2-12
2.6.1-15
2.4.0-22
1.9.5-2
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-6104 None

CVE-2020-27840 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2020-27840
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    15-Oct-24    

Information published.


2.0    16-Oct-24    

Added samba to Azure Linux 3.0


3.0    17-Oct-24    

Added samba to Azure Linux 3.0


4.0    18-Oct-24    

Added samba to Azure Linux 3.0


5.0    19-Oct-24    

Added samba to Azure Linux 3.0


6.0    20-Oct-24    

Added samba to Azure Linux 3.0


7.0    21-Oct-24    

Added samba to Azure Linux 3.0


8.0    22-Oct-24    

Added samba to Azure Linux 3.0


9.0    23-Oct-24    

Added samba to Azure Linux 3.0


10.0    24-Oct-24    

Added samba to Azure Linux 3.0


11.0    25-Oct-24    

Added samba to Azure Linux 3.0


12.0    26-Oct-24    

Added samba to Azure Linux 3.0


13.0    27-Oct-24    

Added samba to Azure Linux 3.0


14.0    28-Oct-24    

Added samba to Azure Linux 3.0


15.0    29-Oct-24    

Added samba to Azure Linux 3.0


16.0    30-Oct-24    

Added samba to Azure Linux 3.0


17.0    31-Oct-24    

Added samba to Azure Linux 3.0


18.0    01-Nov-24    

Added samba to Azure Linux 3.0


19.0    02-Nov-24    

Added samba to Azure Linux 3.0


20.0    04-Nov-24    

Added samba to Azure Linux 3.0


21.0    05-Nov-24    

Added samba to Azure Linux 3.0


22.0    06-Nov-24    

Added samba to Azure Linux 3.0


23.0    07-Nov-24    

Added samba to Azure Linux 3.0


24.0    08-Nov-24    

Added samba to Azure Linux 3.0


25.0    09-Nov-24    

Added samba to Azure Linux 3.0


26.0    10-Nov-24    

Added samba to Azure Linux 3.0


27.0    11-Nov-24    

Added samba to Azure Linux 3.0


28.0    12-Nov-24    

Added samba to Azure Linux 3.0


29.0    13-Nov-24    

Added samba to Azure Linux 3.0


30.0    14-Nov-24    

Added samba to Azure Linux 3.0


31.0    15-Nov-24    

Added samba to Azure Linux 3.0


32.0    16-Nov-24    

Added samba to Azure Linux 3.0


33.0    17-Nov-24    

Added samba to Azure Linux 3.0


34.0    18-Nov-24    

Added samba to Azure Linux 3.0


35.0    19-Nov-24    

Added samba to Azure Linux 3.0


36.0    20-Nov-24    

Added samba to Azure Linux 3.0


37.0    21-Nov-24    

Added samba to Azure Linux 3.0


38.0    23-Nov-24    

Added samba to Azure Linux 3.0


39.0    24-Nov-24    

Added samba to Azure Linux 3.0


40.0    25-Nov-24    

Added samba to Azure Linux 3.0


41.0    26-Nov-24    

Added samba to Azure Linux 3.0


42.0    27-Nov-24    

Added samba to Azure Linux 3.0


43.0    28-Nov-24    

Added samba to Azure Linux 3.0


44.0    29-Nov-24    

Added samba to Azure Linux 3.0


45.0    30-Nov-24    

Added samba to Azure Linux 3.0


46.0    01-Dec-24    

Added samba to Azure Linux 3.0


47.0    02-Dec-24    

Added samba to Azure Linux 3.0


48.0    03-Dec-24    

Added samba to Azure Linux 3.0


49.0    04-Dec-24    

Added samba to Azure Linux 3.0


50.0    05-Dec-24    

Added samba to Azure Linux 3.0


51.0    07-Dec-24    

Added samba to Azure Linux 3.0


52.0    08-Dec-24    

Added samba to Azure Linux 3.0


53.0    09-Dec-24    

Added samba to Azure Linux 3.0


54.0    10-Dec-24    

Added samba to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2020-27840
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM samba (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.18.3-1 Unknown None
Azure Linux 3.0 x64 samba (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.18.3-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2020-27840 None

CVE-2022-32746 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-32746
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:5.4
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    15-Oct-24    

Information published.


2.0    16-Oct-24    

Added samba to Azure Linux 3.0


3.0    17-Oct-24    

Added samba to Azure Linux 3.0


4.0    18-Oct-24    

Added samba to Azure Linux 3.0


5.0    19-Oct-24    

Added samba to Azure Linux 3.0


6.0    20-Oct-24    

Added samba to Azure Linux 3.0


7.0    21-Oct-24    

Added samba to Azure Linux 3.0


8.0    22-Oct-24    

Added samba to Azure Linux 3.0


9.0    23-Oct-24    

Added samba to Azure Linux 3.0


10.0    24-Oct-24    

Added samba to Azure Linux 3.0


11.0    25-Oct-24    

Added samba to Azure Linux 3.0


12.0    26-Oct-24    

Added samba to Azure Linux 3.0


13.0    27-Oct-24    

Added samba to Azure Linux 3.0


14.0    28-Oct-24    

Added samba to Azure Linux 3.0


15.0    29-Oct-24    

Added samba to Azure Linux 3.0


16.0    30-Oct-24    

Added samba to Azure Linux 3.0


17.0    31-Oct-24    

Added samba to Azure Linux 3.0


18.0    01-Nov-24    

Added samba to Azure Linux 3.0


19.0    02-Nov-24    

Added samba to Azure Linux 3.0


20.0    04-Nov-24    

Added samba to Azure Linux 3.0


21.0    05-Nov-24    

Added samba to Azure Linux 3.0


22.0    06-Nov-24    

Added samba to Azure Linux 3.0


23.0    07-Nov-24    

Added samba to Azure Linux 3.0


24.0    08-Nov-24    

Added samba to Azure Linux 3.0


25.0    09-Nov-24    

Added samba to Azure Linux 3.0


26.0    10-Nov-24    

Added samba to Azure Linux 3.0


27.0    11-Nov-24    

Added samba to Azure Linux 3.0


28.0    12-Nov-24    

Added samba to Azure Linux 3.0


29.0    13-Nov-24    

Added samba to Azure Linux 3.0


30.0    14-Nov-24    

Added samba to Azure Linux 3.0


31.0    15-Nov-24    

Added samba to Azure Linux 3.0


32.0    16-Nov-24    

Added samba to Azure Linux 3.0


33.0    17-Nov-24    

Added samba to Azure Linux 3.0


34.0    18-Nov-24    

Added samba to Azure Linux 3.0


35.0    19-Nov-24    

Added samba to Azure Linux 3.0


36.0    20-Nov-24    

Added samba to Azure Linux 3.0


37.0    21-Nov-24    

Added samba to Azure Linux 3.0


38.0    23-Nov-24    

Added samba to Azure Linux 3.0


39.0    24-Nov-24    

Added samba to Azure Linux 3.0


40.0    25-Nov-24    

Added samba to Azure Linux 3.0


41.0    26-Nov-24    

Added samba to Azure Linux 3.0


42.0    27-Nov-24    

Added samba to Azure Linux 3.0


43.0    28-Nov-24    

Added samba to Azure Linux 3.0


44.0    29-Nov-24    

Added samba to Azure Linux 3.0


45.0    30-Nov-24    

Added samba to Azure Linux 3.0


46.0    01-Dec-24    

Added samba to Azure Linux 3.0


47.0    02-Dec-24    

Added samba to Azure Linux 3.0


48.0    03-Dec-24    

Added samba to Azure Linux 3.0


49.0    04-Dec-24    

Added samba to Azure Linux 3.0


50.0    05-Dec-24    

Added samba to Azure Linux 3.0


51.0    07-Dec-24    

Added samba to Azure Linux 3.0


52.0    08-Dec-24    

Added samba to Azure Linux 3.0


53.0    09-Dec-24    

Added samba to Azure Linux 3.0


54.0    10-Dec-24    

Added samba to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-32746
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM samba (CBL-Mariner) Unknown Unknown None Base: 5.4
Temporal: 5.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
4.18.3-1 Unknown None
Azure Linux 3.0 x64 samba (CBL-Mariner) Unknown Unknown None Base: 5.4
Temporal: 5.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
4.18.3-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-32746 None

CVE-2023-1393 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-1393
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    03-Apr-23    

Information published.


1.0    30-Jun-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    12-Sep-24    

Information published.


1.0    13-Sep-24    

Information published.


1.0    14-Sep-24    

Information published.


1.0    15-Sep-24    

Information published.


1.0    16-Sep-24    

Information published.


1.0    17-Sep-24    

Information published.


1.0    18-Sep-24    

Information published.


1.0    19-Sep-24    

Information published.


1.0    20-Sep-24    

Information published.


1.0    21-Sep-24    

Information published.


1.0    22-Sep-24    

Information published.


1.0    23-Sep-24    

Information published.


1.0    24-Sep-24    

Information published.


1.0    25-Sep-24    

Information published.


1.0    26-Sep-24    

Information published.


1.0    27-Sep-24    

Information published.


1.0    28-Sep-24    

Information published.


1.0    29-Sep-24    

Information published.


1.0    30-Sep-24    

Information published.


1.0    01-Oct-24    

Information published.


1.0    02-Oct-24    

Information published.


1.0    03-Oct-24    

Information published.


1.0    04-Oct-24    

Information published.


1.0    05-Oct-24    

Information published.


1.0    06-Oct-24    

Information published.


1.0    07-Oct-24    

Information published.


1.0    09-Oct-24    

Information published.


1.0    10-Oct-24    

Information published.


1.0    11-Oct-24    

Information published.


1.0    12-Oct-24    

Information published.


1.0    13-Oct-24    

Information published.


1.0    14-Oct-24    

Information published.


2.0    15-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


3.0    16-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


4.0    17-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


5.0    18-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


6.0    19-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


7.0    20-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


8.0    21-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


9.0    22-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


10.0    23-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


11.0    24-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


12.0    25-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


13.0    26-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


14.0    27-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


15.0    28-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


16.0    29-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


17.0    30-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


18.0    31-Oct-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


19.0    01-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


20.0    02-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


21.0    04-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


22.0    05-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


23.0    06-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


24.0    07-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


25.0    08-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


26.0    09-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


27.0    10-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


28.0    11-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


29.0    12-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


30.0    13-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


31.0    14-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


32.0    15-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


33.0    16-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


34.0    17-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


35.0    18-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


36.0    19-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


37.0    20-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


38.0    21-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


39.0    23-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


40.0    24-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


41.0    25-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


42.0    26-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


43.0    27-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


44.0    28-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


45.0    29-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


46.0    30-Nov-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


47.0    01-Dec-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


48.0    02-Dec-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


49.0    03-Dec-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


50.0    04-Dec-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


51.0    05-Dec-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


52.0    07-Dec-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


53.0    08-Dec-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


54.0    09-Dec-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


55.0    10-Dec-24    

Added xorg-x11-server to Azure Linux 3.0 Added xorg-x11-server to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-1393
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-4 Unknown None
Azure Linux 3.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-4 Unknown None
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-4 Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-4 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-1393 None

CVE-2023-5679 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-5679
MITRE
NVD

Issuing CNA: security-officer@isc.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    19-Feb-24    

Information published.


1.0    30-Jun-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added bind to CBL-Mariner 2.0 Added bind to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-5679
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM bind (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.19.21-1 Unknown None
Azure Linux 3.0 x64 bind (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.19.21-1 Unknown None
CBL Mariner 2.0 ARM bind (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.16.48-1 Unknown None
CBL Mariner 2.0 x64 bind (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.16.48-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-5679 None

CVE-2022-3650 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-3650
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-24    

Information published.


1.0    30-Jun-24    

Information published.


2.0    03-Dec-24    

Added ceph to CBL-Mariner 2.0 Added ceph to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-3650
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM ceph (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
18.2.1-1 Unknown None
Azure Linux 3.0 x64 ceph (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
18.2.1-1 Unknown None
CBL Mariner 2.0 ARM ceph (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
16.2.10-3 Unknown None
CBL Mariner 2.0 x64 ceph (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
16.2.10-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-3650 None

CVE-2024-24786 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-24786
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Mar-24    

Information published.


2.0    01-Apr-24    

Added node-problem-detector to CBL-Mariner 2.0


1.0    30-Jun-24    

Information published.


1.0    02-Jul-24    

Information published.


1.0    10-Jul-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    25-Aug-24    

Information published.


1.0    26-Aug-24    

Information published.


1.0    27-Aug-24    

Information published.


1.0    28-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    13-Sep-24    

Information published.


1.0    12-Oct-24    

Information published.


3.0    16-Oct-24    

Added prometheus to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added vitess to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added ig to Azure Linux 3.0


4.0    01-Nov-24    

Added kubernetes to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added vitess to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added ig to Azure Linux 3.0


5.0    08-Nov-24    

Added azcopy to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


6.0    14-Nov-24    

Added skopeo to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


7.0    27-Nov-24    

Added sriov-network-device-plugin to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


8.0    03-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


9.0    04-Dec-24    

Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0


10.0    07-Dec-24    

Added cf-cli to Azure Linux 3.0 Added containerd to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added coredns to Azure Linux 3.0 Added docker-cli to Azure Linux 3.0 Added influxdb to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added libcontainers-common to Azure Linux 3.0 Added moby-containerd-cc to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0 Added node-problem-detector to Azure Linux 3.0 Added packer to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added azcopy to Azure Linux 3.0 Added blobfuse2 to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added cri-tools to Azure Linux 3.0 Added docker-buildx to Azure Linux 3.0 Added docker-compose to Azure Linux 3.0 Added ig to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added kube-vip-cloud-provider to Azure Linux 3.0 Added opa to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added vitess to Azure Linux 3.0 Added kata-containers to CBL-Mariner 2.0 Added kata-containers-cc to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added kubevirt to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added node-problem-detector to CBL-Mariner 2.0 Added opa to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added prometheus-adapter to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-24786
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
cf-cli (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.24.0-1
2.3.0-1
1.12.12-1
8.7.3-3
None
Azure Linux 3.0 x64 azcopy (CBL-Mariner)
blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
cf-cli (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.24.0-1
2.3.0-1
1.12.12-1
8.7.3-3
None
CBL Mariner 2.0 ARM azcopy (CBL-Mariner)
cert-manager (CBL-Mariner)
kata-containers (CBL-Mariner)
kata-containers-cc (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.24.0-1
1.11.2-14
3.2.0.azl2-1
None
CBL Mariner 2.0 x64 azcopy (CBL-Mariner)
cert-manager (CBL-Mariner)
kata-containers (CBL-Mariner)
kata-containers-cc (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.24.0-1
1.11.2-14
3.2.0.azl2-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-24786 None

CVE-2023-3978 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-3978
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:6.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-23    

Information published.


2.0    18-Jan-24    

Added packer to CBL-Mariner 2.0


1.0    30-Jun-24    

Information published.


1.0    10-Jul-24    

Information published.


1.0    25-Aug-24    

Information published.


1.0    26-Aug-24    

Information published.


1.0    27-Aug-24    

Information published.


1.0    28-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    13-Sep-24    

Information published.


1.0    12-Oct-24    

Information published.


3.0    15-Oct-24    

Added multus to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added vitess to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0 Added cert-manager to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0


4.0    01-Nov-24    

Added cni-plugins to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added vitess to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0


5.0    03-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added multus to CBL-Mariner 2.0 Added cni-plugins to CBL-Mariner 2.0 Added vitess to CBL-Mariner 2.0 Added packer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added multus to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added prometheus-adapter to Azure Linux 3.0 Added vitess to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added kubevirt to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-3978
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cert-manager (CBL-Mariner)
kubevirt (CBL-Mariner)
multus (CBL-Mariner)
prometheus-adapter (CBL-Mariner)
Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1.12.12-1
1.2.0-1
4.0.2-2
0.12.0-1
None
Azure Linux 3.0 x64 cert-manager (CBL-Mariner)
kubevirt (CBL-Mariner)
multus (CBL-Mariner)
prometheus-adapter (CBL-Mariner)
Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1.12.12-1
1.2.0-1
4.0.2-2
0.12.0-1
None
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner)
cni-plugins (CBL-Mariner)
multus (CBL-Mariner)
packer (CBL-Mariner)
Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1.11.2-14
1.3.0-6
4.0.2-5
1.10.1-1
None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner)
cni-plugins (CBL-Mariner)
multus (CBL-Mariner)
packer (CBL-Mariner)
Unknown Unknown Base: 6.1
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1.11.2-14
1.3.0-6
4.0.2-5
1.10.1-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-3978 None

CVE-2021-43565 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-43565
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Jul-24    

Information published.


1.0    05-Aug-24    

Information published.


1.0    18-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added cf-cli to CBL-Mariner 2.0 Added moby-buildx to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added gh to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-43565
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM libcontainers-common (CBL-Mariner)
cf-cli (CBL-Mariner)
cri-o (CBL-Mariner)
gh (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
20210626-5
8.4.0-18
1.22.3-5
2.13.0-19
None
CBL Mariner 2.0 x64 cf-cli (CBL-Mariner)
cri-o (CBL-Mariner)
gh (CBL-Mariner)
libcontainers-common (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.4.0-18
1.22.3-5
2.13.0-19
20210626-5
None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-43565 None

CVE-2021-24032 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-24032
MITRE
NVD

Issuing CNA: cve-assign@fb.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    30-Jul-21    

Information published.


2.0    08-Apr-24    

Added ceph to CBL-Mariner 2.0


3.0    03-Dec-24    

Added ceph to CBL-Mariner 2.0 Added zstd to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-24032
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM zstd (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1.4.9-1 Unknown None
CBL Mariner 1.0 x64 zstd (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1.4.9-1 Unknown None
CBL Mariner 2.0 ARM ceph (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
16.2.10-3 Unknown None
CBL Mariner 2.0 x64 ceph (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
16.2.10-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-24032 None

CVE-2024-27913 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-27913
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added frr to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-27913
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM frr (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
8.5.5-1 Unknown None
CBL Mariner 2.0 x64 frr (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
8.5.5-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-27913 None

CVE-2024-31950 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-31950
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added frr to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-31950
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM frr (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
8.5.5-1 Unknown None
CBL Mariner 2.0 x64 frr (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
8.5.5-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-31950 None

CVE-2024-44070 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-44070
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added frr to CBL-Mariner 2.0 Added frr to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-44070
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM frr (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.1.1-2 Unknown None
Azure Linux 3.0 x64 frr (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.1.1-2 Unknown None
CBL Mariner 2.0 ARM frr (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.5.5-1 Unknown None
CBL Mariner 2.0 x64 frr (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.5.5-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-44070 None

CVE-2024-31951 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-31951
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


2.0    05-Nov-24    

Added frr to CBL-Mariner 2.0


3.0    03-Dec-24    

Added frr to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-31951
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM frr (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.5.5-1 Unknown None
CBL Mariner 2.0 x64 frr (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.5.5-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-31951 None

CVE-2024-33602 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-33602
MITRE
NVD

Issuing CNA: glibc-cna@sourceware.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:7.4
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-May-24    

Information published.


1.0    12-Jul-24    

Information published.


2.0    03-Dec-24    

Added glibc to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-33602
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM glibc (CBL-Mariner) Unknown Unknown None Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
2.35-7 Unknown None
CBL Mariner 2.0 x64 glibc (CBL-Mariner) Unknown Unknown None Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
2.35-7 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-33602 None

CVE-2024-29166 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29166
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


1.0    30-Jun-24    

Information published.


2.0    03-Dec-24    

Added hdf5 to CBL-Mariner 2.0 Added hdf5 to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29166
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM hdf5 (CBL-Mariner) Unknown Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1.14.4.3-1 Unknown None
Azure Linux 3.0 x64 hdf5 (CBL-Mariner) Unknown Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1.14.4.3-1 Unknown None
CBL Mariner 2.0 ARM hdf5 (CBL-Mariner) Unknown Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1.14.4-1 Unknown None
CBL Mariner 2.0 x64 hdf5 (CBL-Mariner) Unknown Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1.14.4-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29166 None

CVE-2022-48788 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-48788
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-48788
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.32.1-3 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.32.1-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-48788 None

CVE-2024-38472 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38472
MITRE
NVD

Issuing CNA: security@apache.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    19-Jul-24    

Information published.


1.0    15-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added httpd to CBL-Mariner 2.0 Added httpd to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38472
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM httpd (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.4.61-1 Unknown None
Azure Linux 3.0 x64 httpd (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.4.61-1 Unknown None
CBL Mariner 2.0 ARM httpd (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.4.61-1 Unknown None
CBL Mariner 2.0 x64 httpd (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.4.61-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38472 None

CVE-2021-3847 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-3847
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Jul-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-3847
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.160.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.160.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-3847 None

CVE-2024-39884 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39884
MITRE
NVD

Issuing CNA: security@apache.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.2/TemporalScore:6.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    19-Jul-24    

Information published.


1.0    15-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    21-Nov-24    

Added httpd to CBL-Mariner 2.0 Added httpd to Azure Linux 3.0


3.0    03-Dec-24    

Added httpd to CBL-Mariner 2.0 Added httpd to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39884
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM httpd (CBL-Mariner) Unknown Unknown None Base: 6.2
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.4.61-1 Unknown None
Azure Linux 3.0 x64 httpd (CBL-Mariner) Unknown Unknown None Base: 6.2
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.4.61-1 Unknown None
CBL Mariner 2.0 ARM httpd (CBL-Mariner) Unknown Unknown None Base: 6.2
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.4.61-1 Unknown None
CBL Mariner 2.0 x64 httpd (CBL-Mariner) Unknown Unknown None Base: 6.2
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.4.61-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39884 None

CVE-2023-31084 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-31084
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    01-Sep-23    

Information published.


1.0    15-Aug-24    

Information published.


1.0    05-Oct-24    

Information published.


1.0    06-Oct-24    

Information published.


1.0    07-Oct-24    

Information published.


1.0    08-Oct-24    

Information published.


1.0    09-Oct-24    

Information published.


1.0    10-Oct-24    

Information published.


1.0    11-Oct-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    03-Dec-24    

Added hyperv-daemons to CBL-Mariner 2.0 Added hyperv-daemons to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-31084
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-1 Unknown None
Azure Linux 3.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-1 Unknown None
CBL Mariner 2.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.158.2-1 Unknown None
CBL Mariner 2.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.158.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-31084 None

CVE-2024-36387 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-36387
MITRE
NVD

Issuing CNA: security@apache.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:5.4
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    19-Jul-24    

Information published.


1.0    15-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added httpd to CBL-Mariner 2.0 Added httpd to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-36387
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM httpd (CBL-Mariner) Unknown Unknown None Base: 5.4
Temporal: 5.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
2.4.61-1 Unknown None
Azure Linux 3.0 x64 httpd (CBL-Mariner) Unknown Unknown None Base: 5.4
Temporal: 5.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
2.4.61-1 Unknown None
CBL Mariner 2.0 ARM httpd (CBL-Mariner) Unknown Unknown None Base: 5.4
Temporal: 5.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
2.4.61-1 Unknown None
CBL Mariner 2.0 x64 httpd (CBL-Mariner) Unknown Unknown None Base: 5.4
Temporal: 5.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
2.4.61-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-36387 None

CVE-2024-26978 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26978
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Jul-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26978
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-5 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-5 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.160.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.160.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26978 None

CVE-2024-38577 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38577
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


3.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38577
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-5 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-5 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38577 None

CVE-2024-39483 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39483
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39483
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-5 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-5 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39483 None

CVE-2024-38664 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38664
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Jul-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38664
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-4 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-4 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.160.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.160.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38664 None

CVE-2024-39485 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39485
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39485
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-5 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-5 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39485 None

CVE-2024-42071 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42071
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42071
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42071 None

CVE-2024-42072 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42072
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42072
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.43.1-7 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.43.1-7 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42072 None

CVE-2024-43892 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43892
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Oct-24    

Information published.


2.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0


3.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43892
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43892 None

CVE-2024-42228 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42228
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    16-Aug-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


3.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42228
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.0
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.43.1-7 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.0
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.43.1-7 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.0
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.0
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42228 None

CVE-2024-42297 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42297
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Oct-24    

Information published.


2.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0


3.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42297
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42297 None

CVE-2024-42246 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42246
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    16-Aug-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


3.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42246
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42246 None

CVE-2024-43897 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43897
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Oct-24    

Information published.


2.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0


3.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43897
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43897 None

CVE-2024-43829 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43829
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Oct-24    

Information published.


2.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0


3.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43829
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43829 None

CVE-2024-43905 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43905
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Oct-24    

Information published.


2.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0


3.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43905
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43905 None

CVE-2024-7347 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7347
MITRE
NVD

Issuing CNA: f5sirt@f5.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


2.0    15-Oct-24    

Added nginx to Azure Linux 3.0 Added nginx to CBL-Mariner 2.0


3.0    03-Dec-24    

Added nginx to CBL-Mariner 2.0 Added nginx to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7347
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM nginx (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1.25.4-2 Unknown None
Azure Linux 3.0 x64 nginx (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1.25.4-2 Unknown None
CBL Mariner 2.0 ARM nginx (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1.22.1-12 Unknown None
CBL Mariner 2.0 x64 nginx (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
1.22.1-12 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7347 None

CVE-2023-6277 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-6277
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Aug-24    

Information published.


1.0    19-Aug-24    

Information published.


1.0    20-Aug-24    

Information published.


1.0    21-Aug-24    

Information published.


1.0    22-Aug-24    

Information published.


1.0    23-Aug-24    

Information published.


1.0    24-Aug-24    

Information published.


1.0    25-Aug-24    

Information published.


1.0    26-Aug-24    

Information published.


1.0    27-Aug-24    

Information published.


1.0    28-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added libtiff to CBL-Mariner 2.0 Added libtiff to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-6277
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libtiff (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.6.0-3 Unknown None
Azure Linux 3.0 x64 libtiff (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.6.0-3 Unknown None
CBL Mariner 2.0 ARM libtiff (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.6.0-3 Unknown None
CBL Mariner 2.0 x64 libtiff (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
4.6.0-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-6277 None

CVE-2024-8088 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-8088
MITRE
NVD

Issuing CNA: cna@python.org

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    26-Sep-24    

Information published.


2.0    15-Oct-24    

Added python3 to Azure Linux 3.0 Added tensorflow to Azure Linux 3.0 Added python3 to CBL-Mariner 2.0


3.0    03-Dec-24    

Added python3 to CBL-Mariner 2.0 Added python3 to Azure Linux 3.0 Added tensorflow to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-8088
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python3 (CBL-Mariner)
tensorflow (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
3.12.3-4
2.16.1-7
None
Azure Linux 3.0 x64 python3 (CBL-Mariner)
tensorflow (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
3.12.3-4
2.16.1-7
None
CBL Mariner 2.0 ARM python3 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
3.9.19-5 Unknown None
CBL Mariner 2.0 x64 python3 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
3.9.19-5 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-8088 None

CVE-2024-26458 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26458
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


1.0    05-Oct-24    

Information published.


2.0    15-Oct-24    

Added krb5 to Azure Linux 3.0 Added krb5 to CBL-Mariner 2.0


3.0    03-Dec-24    

Added krb5 to CBL-Mariner 2.0 Added krb5 to Azure Linux 3.0


4.0    08-Dec-24    

Added krb5 to CBL-Mariner 2.0 Added krb5 to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26458
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM krb5 (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1.21.3-2 Unknown None
Azure Linux 3.0 x64 krb5 (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1.21.3-2 Unknown None
CBL Mariner 2.0 ARM krb5 (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1.21.3-2 Unknown None
CBL Mariner 2.0 x64 krb5 (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1.21.3-2 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26458 None

CVE-2024-43799 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43799
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    16-Oct-24    

Information published.


2.0    25-Oct-24    

Added reaper to CBL-Mariner 2.0


3.0    03-Dec-24    

Added reaper to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43799
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM reaper (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
3.1.1-13 Unknown None
CBL Mariner 2.0 x64 reaper (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
3.1.1-13 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43799 None

CVE-2024-44974 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-44974
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Oct-24    

Information published.


2.0    15-Oct-24    

Added kernel to Azure Linux 3.0 Added kernel to CBL-Mariner 2.0


3.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


4.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-44974
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.51.1-1 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.51.1-1 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-44974 None

CVE-2024-31080 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-31080
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Aug-24    

Information published.


1.0    05-Oct-24    

Information published.


2.0    03-Dec-24    

Added xorg-x11-server to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-31080
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown None Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1.20.10-11 Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown None Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1.20.10-11 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-31080 None

CVE-2024-49761 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49761
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Nov-24    

Information published.


2.0    03-Dec-24    

Added ruby to CBL-Mariner 2.0 Added rubygem-rexml to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49761
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM ruby (CBL-Mariner)
rubygem-rexml (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.1.4-8
3.2.7-3
None
CBL Mariner 2.0 x64 ruby (CBL-Mariner)
rubygem-rexml (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.1.4-8
3.2.7-3
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49761 None

CVE-2024-31083 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-31083
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Aug-24    

Information published.


1.0    05-Oct-24    

Information published.


2.0    03-Dec-24    

Added xorg-x11-server to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-31083
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-11 Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1.20.10-11 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-31083 None

CVE-2024-31449 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-31449
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    16-Oct-24    

Information published.


2.0    01-Nov-24    

Added redis to CBL-Mariner 2.0


3.0    14-Nov-24    

Added valkey to Azure Linux 3.0 Added redis to CBL-Mariner 2.0


4.0    03-Dec-24    

Added redis to CBL-Mariner 2.0 Added valkey to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-31449
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM valkey (CBL-Mariner) Unknown Unknown None Base: 7.0
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
8.0.1-1 Unknown None
Azure Linux 3.0 x64 valkey (CBL-Mariner) Unknown Unknown None Base: 7.0
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
8.0.1-1 Unknown None
CBL Mariner 2.0 ARM redis (CBL-Mariner) Unknown Unknown None Base: 7.0
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.2.14-3 Unknown None
CBL Mariner 2.0 x64 redis (CBL-Mariner) Unknown Unknown None Base: 7.0
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6.2.14-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-31449 None

CVE-2024-31082 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-31082
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Aug-24    

Information published.


1.0    05-Oct-24    

Information published.


2.0    03-Dec-24    

Added xorg-x11-server to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-31082
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown None Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1.20.10-11 Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown None Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1.20.10-11 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-31082 None

CVE-2023-4408 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-4408
MITRE
NVD

Issuing CNA: security-officer@isc.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    19-Feb-24    

Information published.


1.0    30-Jun-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added bind to CBL-Mariner 2.0 Added bind to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-4408
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM bind (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.19.21-1 Unknown None
Azure Linux 3.0 x64 bind (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.19.21-1 Unknown None
CBL Mariner 2.0 ARM bind (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.16.48-1 Unknown None
CBL Mariner 2.0 x64 bind (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
9.16.48-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-4408 None

CVE-2022-3854 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-3854
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-24    

Information published.


1.0    30-Jun-24    

Information published.


2.0    03-Dec-24    

Added ceph to CBL-Mariner 2.0 Added ceph to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-3854
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM ceph (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
18.2.1-1 Unknown None
Azure Linux 3.0 x64 ceph (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
18.2.1-1 Unknown None
CBL Mariner 2.0 ARM ceph (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
16.2.10-3 Unknown None
CBL Mariner 2.0 x64 ceph (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
16.2.10-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-3854 None

CVE-2021-28361 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-28361
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-24    

Information published.


2.0    03-Dec-24    

Added ceph to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-28361
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM ceph (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
16.2.10-3 Unknown None
CBL Mariner 2.0 x64 ceph (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
16.2.10-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-28361 None

CVE-2024-25620 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-25620
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.4/TemporalScore:6.4
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    30-Jun-24    

Information published.


1.0    18-Aug-24    

Information published.


1.0    25-Aug-24    

Information published.


1.0    26-Aug-24    

Information published.


1.0    27-Aug-24    

Information published.


1.0    28-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added helm to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-25620
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cert-manager (CBL-Mariner)
helm (CBL-Mariner)
Unknown Unknown Base: 6.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1.12.12-2
3.13.2-3
None
Azure Linux 3.0 x64 cert-manager (CBL-Mariner)
helm (CBL-Mariner)
Unknown Unknown Base: 6.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1.12.12-2
3.13.2-3
None
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner) Unknown Unknown None Base: 6.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1.11.2-12 Unknown None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner) Unknown Unknown None Base: 6.4
Temporal: 6.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
1.11.2-12 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-25620 None

CVE-2024-28180 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28180
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Apr-24    

Information published.


1.0    30-Jun-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    25-Aug-24    

Information published.


1.0    26-Aug-24    

Information published.


1.0    27-Aug-24    

Information published.


1.0    28-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    13-Sep-24    

Information published.


1.0    05-Oct-24    

Information published.


1.0    09-Oct-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    16-Oct-24    

Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0


3.0    01-Nov-24    

Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0


4.0    09-Nov-24    

Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0


5.0    14-Nov-24    

Added skopeo to CBL-Mariner 2.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cert-manager to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0


6.0    03-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added telegraf to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added dcos-cli to CBL-Mariner 2.0 Added kubernetes to CBL-Mariner 2.0 Added kube-vip-cloud-provider to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added dcos-cli to Azure Linux 3.0 Added kubernetes to Azure Linux 3.0 Added cert-manager to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added telegraf to Azure Linux 3.0 Added keda to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28180
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cert-manager (CBL-Mariner)
dcos-cli (CBL-Mariner)
keda (CBL-Mariner)
kubernetes (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1.12.12-1
1.2.0-16
2.14.0-1
1.30.1-1
None
Azure Linux 3.0 x64 cert-manager (CBL-Mariner)
dcos-cli (CBL-Mariner)
keda (CBL-Mariner)
kubernetes (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1.12.12-1
1.2.0-16
2.14.0-1
1.30.1-1
None
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
cri-o (CBL-Mariner)
dcos-cli (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1.11.2-14
1.55.0-20
1.21.7-2
1.2.0-19
None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
cri-o (CBL-Mariner)
dcos-cli (CBL-Mariner)
Unknown Unknown Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
1.11.2-14
1.55.0-20
1.21.7-2
1.2.0-19
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28180 None

CVE-2022-41717 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-41717
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Dec-22    

Information published.


2.0    24-Jan-24    

Added sriov-network-device-plugin to CBL-Mariner 2.0


3.0    12-Feb-24    

Added nmi to CBL-Mariner 2.0


4.0    11-Apr-24    

Added cri-o to CBL-Mariner 2.0


1.0    30-Jun-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    05-Oct-24    

Information published.


5.0    16-Oct-24    

Added prometheus to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added nmi to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added golang to CBL-Mariner 2.0 Added moby-engine to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added golang to CBL-Mariner 1.0


6.0    03-Dec-24    

Added containerized-data-importer to CBL-Mariner 2.0 Added prometheus to CBL-Mariner 2.0 Added azcopy to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added nmi to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 Added golang to CBL-Mariner 2.0 Added moby-engine to Azure Linux 3.0 Added sriov-network-device-plugin to Azure Linux 3.0 Added prometheus to Azure Linux 3.0 Added golang to CBL-Mariner 1.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-41717
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM moby-engine (CBL-Mariner)
prometheus (CBL-Mariner)
sriov-network-device-plugin (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
25.0.3-1
2.45.4-1
3.7.0-1
None
Azure Linux 3.0 x64 moby-engine (CBL-Mariner)
prometheus (CBL-Mariner)
sriov-network-device-plugin (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
25.0.3-1
2.45.4-1
3.7.0-1
None
CBL Mariner 1.0 ARM golang (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1.18.8-2 Unknown None
CBL Mariner 1.0 x64 golang (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1.18.8-2 Unknown None
CBL Mariner 2.0 ARM azcopy (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
cri-o (CBL-Mariner)
golang (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.24.0-1
1.55.0-20
1.22.3-1
1.18.8-2
None
CBL Mariner 2.0 x64 azcopy (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
cri-o (CBL-Mariner)
golang (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
10.24.0-1
1.55.0-20
1.22.3-1
1.18.8-2
None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-41717 None

CVE-2023-2253 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-2253
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Jun-23    

Information published.


1.0    08-Jun-23    

Information published.


1.0    30-Jun-24    

Information published.


1.0    25-Aug-24    

Information published.


1.0    26-Aug-24    

Information published.


1.0    27-Aug-24    

Information published.


1.0    28-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    13-Sep-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    03-Dec-24    

Added cert-manager to CBL-Mariner 2.0 Added moby-compose to CBL-Mariner 2.0 Added moby-cli to CBL-Mariner 2.0 Added moby-engine to CBL-Mariner 2.0 Added helm to CBL-Mariner 2.0 Added skopeo to CBL-Mariner 2.0 Added cert-manager to Azure Linux 3.0 Added moby-engine to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-2253
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cert-manager (CBL-Mariner)
moby-engine (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.12.12-1
25.0.3-1
None
Azure Linux 3.0 x64 cert-manager (CBL-Mariner)
moby-engine (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.12.12-1
25.0.3-1
None
CBL Mariner 2.0 ARM cert-manager (CBL-Mariner)
helm (CBL-Mariner)
moby-cli (CBL-Mariner)
moby-compose (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.11.2-14
3.13.2-1
20.10.27-1
2.17.3-5
None
CBL Mariner 2.0 x64 cert-manager (CBL-Mariner)
helm (CBL-Mariner)
moby-cli (CBL-Mariner)
moby-compose (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
1.11.2-14
3.13.2-1
20.10.27-1
2.17.3-5
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-2253 None

CVE-2024-3727 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-3727
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.3/TemporalScore:8.3
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    30-Jun-24    

Information published.


1.0    10-Jul-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    19-Sep-24    

Information published.


2.0    03-Dec-24    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


3.0    04-Dec-24    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


4.0    05-Dec-24    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


5.0    07-Dec-24    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


6.0    08-Dec-24    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


7.0    09-Dec-24    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


8.0    10-Dec-24    

Added skopeo to CBL-Mariner 2.0 Added libcontainers-common to CBL-Mariner 2.0 Added cri-o to CBL-Mariner 2.0 Added containerized-data-importer to CBL-Mariner 2.0 Added libcontainers-common to Azure Linux 3.0 Added skopeo to Azure Linux 3.0 Added containerized-data-importer to Azure Linux 3.0 Added ig to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-3727
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libcontainers-common (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
ig (CBL-Mariner)
skopeo (CBL-Mariner)
Unknown Unknown Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
20240213-2
1.57.0-2
0.29.0-1
1.14.4-1
None
Azure Linux 3.0 x64 containerized-data-importer (CBL-Mariner)
ig (CBL-Mariner)
libcontainers-common (CBL-Mariner)
skopeo (CBL-Mariner)
Unknown Unknown Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1.57.0-2
0.29.0-1
20240213-2
1.14.4-1
None
CBL Mariner 2.0 ARM libcontainers-common (CBL-Mariner)
containerized-data-importer (CBL-Mariner)
cri-o (CBL-Mariner)
skopeo (CBL-Mariner)
Unknown Unknown Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
20210626-7
1.55.0-19
1.22.3-4
1.14.2-4
None
CBL Mariner 2.0 x64 containerized-data-importer (CBL-Mariner)
cri-o (CBL-Mariner)
libcontainers-common (CBL-Mariner)
skopeo (CBL-Mariner)
Unknown Unknown Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
1.55.0-19
1.22.3-4
20210626-7
1.14.2-4
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-3727 None

CVE-2022-1055 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-1055
MITRE
NVD

Issuing CNA: security@google.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Apr-22    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-1055
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.10.111.1-1 Unknown None
CBL Mariner 1.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.10.111.1-1 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.32.1-3 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.32.1-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-1055 None

CVE-2023-52340 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-52340
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-52340
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5.15.148.2-2 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5.15.148.2-2 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-52340 None

CVE-2022-48841 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-48841
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-48841
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-48841 None

CVE-2024-26953 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26953
MITRE
NVD

Issuing CNA: cve@kernel.org

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-May-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    05-Oct-24    

Information published.


1.0    06-Oct-24    

Information published.


1.0    07-Oct-24    

Information published.


1.0    08-Oct-24    

Information published.


1.0    09-Oct-24    

Information published.


1.0    10-Oct-24    

Information published.


1.0    11-Oct-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    03-Dec-24    

Added hyperv-daemons to CBL-Mariner 2.0 Added hyperv-daemons to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26953
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
6.6.35.1-1 Unknown None
Azure Linux 3.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
6.6.35.1-1 Unknown None
CBL Mariner 2.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
5.15.158.2-1 Unknown None
CBL Mariner 2.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
5.15.158.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26953 None

CVE-2024-27397 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-27397
MITRE
NVD

Issuing CNA: cve@kernel.org

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


1.0    05-Oct-24    

Information published.


1.0    06-Oct-24    

Information published.


1.0    07-Oct-24    

Information published.


1.0    08-Oct-24    

Information published.


1.0    09-Oct-24    

Information published.


1.0    10-Oct-24    

Information published.


1.0    11-Oct-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    09-Nov-24    

Added hyperv-daemons to Azure Linux 3.0 Added hyperv-daemons to CBL-Mariner 2.0


3.0    03-Dec-24    

Added hyperv-daemons to CBL-Mariner 2.0 Added hyperv-daemons to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-27397
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
6.6.56.1-1 Unknown None
Azure Linux 3.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
6.6.56.1-1 Unknown None
CBL Mariner 2.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
5.15.158.2-1 Unknown None
CBL Mariner 2.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
5.15.158.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-27397 None

CVE-2024-26900 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26900
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26900
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-4 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-4 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.159.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.159.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26900 None

CVE-2024-38381 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38381
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Oct-24    

Information published.


2.0    15-Oct-24    

Added kernel to Azure Linux 3.0 Added kernel to CBL-Mariner 2.0


3.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


4.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38381
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.51.1-1 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.6.51.1-1 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38381 None

CVE-2024-38588 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38588
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Oct-24    

Information published.


2.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0


3.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38588
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38588 None

CVE-2024-26933 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26933
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Jul-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26933
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-5 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-5 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.160.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.160.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26933 None

CVE-2024-36481 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-36481
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Jul-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-36481
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-4 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-4 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.160.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.160.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-36481 None

CVE-2024-39291 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39291
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Jul-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39291
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-4 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.6.35.1-4 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.160.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.160.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39291 None

CVE-2024-39473 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39473
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39473
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-5 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.35.1-5 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39473 None

CVE-2024-42073 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42073
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42073
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42073 None

CVE-2024-41098 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-41098
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    16-Aug-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


3.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-41098
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-41098 None

CVE-2024-42074 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42074
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42074
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42074 None

CVE-2024-42078 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42078
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42078
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42078 None

CVE-2024-42083 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42083
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42083
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42083 None

CVE-2024-42237 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42237
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42237
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.43.1-7 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42237 None

CVE-2024-43853 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43853
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


3.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43853
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.47.1-1 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.47.1-1 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43853 None

CVE-2024-46863 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-46863
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Oct-24    

Information published.


2.0    01-Nov-24    

Added kernel to CBL-Mariner 2.0


3.0    09-Nov-24    

Added kernel to Azure Linux 3.0 Added kernel to CBL-Mariner 2.0


4.0    03-Dec-24    

Added kernel to CBL-Mariner 2.0 Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-46863
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.56.1-5 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.56.1-5 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-46863 None

CVE-2023-26484 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-26484
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:8.2
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    30-Jun-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    03-Dec-24    

Added kubevirt to CBL-Mariner 2.0 Added kubevirt to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-26484
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kubevirt (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
1.2.0-1 Unknown None
Azure Linux 3.0 x64 kubevirt (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
1.2.0-1 Unknown None
CBL Mariner 2.0 ARM kubevirt (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
0.59.0-20 Unknown None
CBL Mariner 2.0 x64 kubevirt (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N
0.59.0-20 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-26484 None

CVE-2024-11168 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-11168
MITRE
NVD

Issuing CNA: cna@python.org

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    03-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-11168
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM python3 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
3.9.19-7 Unknown None
CBL Mariner 2.0 x64 python3 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
3.9.19-7 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-11168 None

CVE-2024-7006 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7006
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Aug-24    

Information published.


1.0    25-Aug-24    

Information published.


1.0    26-Aug-24    

Information published.


1.0    27-Aug-24    

Information published.


1.0    28-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    03-Dec-24    

Added libtiff to CBL-Mariner 2.0 Added libtiff to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7006
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libtiff (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.6.0-4 Unknown None
Azure Linux 3.0 x64 libtiff (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.6.0-4 Unknown None
CBL Mariner 2.0 ARM libtiff (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.6.0-3 Unknown None
CBL Mariner 2.0 x64 libtiff (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
4.6.0-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7006 None

CVE-2024-43800 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43800
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    16-Oct-24    

Information published.


2.0    25-Oct-24    

Added reaper to CBL-Mariner 2.0


3.0    03-Dec-24    

Added reaper to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43800
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM reaper (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
3.1.1-13 Unknown None
CBL Mariner 2.0 x64 reaper (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N
3.1.1-13 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43800 None

CVE-2024-29018 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29018
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Sep-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    15-Oct-24    

Added moby-engine to Azure Linux 3.0 Added moby-engine to CBL-Mariner 2.0


3.0    03-Dec-24    

Added moby-engine to CBL-Mariner 2.0 Added moby-engine to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29018
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM moby-engine (CBL-Mariner) Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
25.0.3-6 Unknown None
Azure Linux 3.0 x64 moby-engine (CBL-Mariner) Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
25.0.3-6 Unknown None
CBL Mariner 2.0 ARM moby-engine (CBL-Mariner) Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
24.0.9-9 Unknown None
CBL Mariner 2.0 x64 moby-engine (CBL-Mariner) Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
24.0.9-9 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29018 None

CVE-2024-45296 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-45296
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    16-Oct-24    

Information published.


2.0    25-Oct-24    

Added reaper to CBL-Mariner 2.0


3.0    03-Dec-24    

Added reaper to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-45296
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM reaper (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.1.1-13 Unknown None
CBL Mariner 2.0 x64 reaper (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.1.1-13 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-45296 None

CVE-2024-48949 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-48949
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:9.1/TemporalScore:9.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    16-Oct-24    

Information published.


2.0    25-Oct-24    

Added reaper to CBL-Mariner 2.0


3.0    03-Dec-24    

Added reaper to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-48949
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM reaper (CBL-Mariner) Unknown Unknown None Base: 9.1
Temporal: 9.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
3.1.1-13 Unknown None
CBL Mariner 2.0 x64 reaper (CBL-Mariner) Unknown Unknown None Base: 9.1
Temporal: 9.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
3.1.1-13 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-48949 None

CVE-2024-47764 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-47764
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    16-Oct-24    

Information published.


2.0    25-Oct-24    

Added reaper to CBL-Mariner 2.0


3.0    03-Dec-24    

Added reaper to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-47764
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM reaper (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
3.1.1-13 Unknown None
CBL Mariner 2.0 x64 reaper (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
3.1.1-13 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-47764 None

CVE-2024-31081 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-31081
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Aug-24    

Information published.


1.0    05-Oct-24    

Information published.


2.0    03-Dec-24    

Added xorg-x11-server to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-31081
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM xorg-x11-server (CBL-Mariner) Unknown Unknown None Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1.20.10-11 Unknown None
CBL Mariner 2.0 x64 xorg-x11-server (CBL-Mariner) Unknown Unknown None Base: 7.3
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H
1.20.10-11 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-31081 None

CVE-2024-43374 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-43374
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.5/TemporalScore:4.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    03-Dec-24    

Added vim to CBL-Mariner 2.0 Added vim to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-43374
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM vim (CBL-Mariner) Unknown Unknown None Base: 4.5
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
9.0.2190-5 Unknown None
Azure Linux 3.0 x64 vim (CBL-Mariner) Unknown Unknown None Base: 4.5
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
9.0.2190-5 Unknown None
CBL Mariner 2.0 ARM vim (CBL-Mariner) Unknown Unknown None Base: 4.5
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
9.0.2121-3 Unknown None
CBL Mariner 2.0 x64 vim (CBL-Mariner) Unknown Unknown None Base: 4.5
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
9.0.2121-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-43374 None

CVE-2024-21127 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21127
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21127
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21127 None

CVE-2024-21096 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21096
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


5.0    07-Dec-24    

Added mariadb to Azure Linux 3.0 Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21096
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mariadb (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
10.11.10-1
8.0.40-1
None
Azure Linux 3.0 x64 mariadb (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
10.11.10-1
8.0.40-1
None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21096 None

CVE-2024-39472 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39472
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


1.0    12-Oct-24    

Information published.


2.0    15-Oct-24    

Added kernel to Azure Linux 3.0 Added kernel to CBL-Mariner 2.0


3.0    04-Dec-24    

Added kernel to Azure Linux 3.0 Added kernel to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39472
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.47.1-1 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.6.47.1-1 Unknown None
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.167.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39472 None

CVE-2023-46218 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-46218
MITRE
NVD

Issuing CNA: support@hackerone.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Dec-23    

Information published.


2.0    12-Dec-23    

Added mysql to CBL-Mariner 2.0


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


3.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added curl to CBL-Mariner 2.0 Added mysql to CBL-Mariner 2.0


4.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added curl to CBL-Mariner 2.0 Added mysql to CBL-Mariner 2.0


5.0    20-Nov-24    

Added cmake to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0 Added mysql to CBL-Mariner 2.0 Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0


6.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added cmake to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-46218
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cmake (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
3.29.6-1
8.0.40-1
None
Azure Linux 3.0 x64 cmake (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
3.29.6-1
8.0.40-1
None
CBL Mariner 2.0 ARM cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
3.21.4-13
8.5.0-1
8.0.35-2
None
CBL Mariner 2.0 x64 cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
3.21.4-13
8.5.0-1
8.0.35-2
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-46218 None

CVE-2024-21129 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21129
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21129
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21129 None

CVE-2024-21171 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21171
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21171
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21171 None

CVE-2024-21130 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21130
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21130
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21130 None

CVE-2024-21157 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21157
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21157
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21157 None

CVE-2024-21160 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21160
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21160
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21160 None

CVE-2024-21173 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21173
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21173
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21173 None

CVE-2024-21193 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21193
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21193
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21193 None

CVE-2024-21207 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21207
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21207
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21207 None

CVE-2024-21199 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21199
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21199
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21199 None

CVE-2024-21201 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21201
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21201
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21201 None

CVE-2024-21212 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21212
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.4/TemporalScore:4.4
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21212
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.4
Temporal: 4.4
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21212 None

CVE-2024-21213 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21213
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.2/TemporalScore:4.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21213
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.2
Temporal: 4.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21213 None

CVE-2024-21218 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21218
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21218
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21218 None

CVE-2024-21230 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21230
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21230
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21230 None

CVE-2024-21237 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21237
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:2.2/TemporalScore:2.2
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21237
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 2.2
Temporal: 2.2
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 2.2
Temporal: 2.2
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 2.2
Temporal: 2.2
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 2.2
Temporal: 2.2
Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21237 None

CVE-2024-21236 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21236
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21236
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21236 None

CVE-2024-21231 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21231
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:3.1/TemporalScore:3.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21231
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 3.1
Temporal: 3.1
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 3.1
Temporal: 3.1
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 3.1
Temporal: 3.1
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 3.1
Temporal: 3.1
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21231 None

CVE-2024-21247 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21247
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:3.8/TemporalScore:3.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21247
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 3.8
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 3.8
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 3.8
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 3.8
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21247 None

CVE-2024-7264 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7264
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7264
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7264 None

CVE-2024-26908 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26908
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    30-Jun-24    

Information published.


2.0    04-Dec-24    

Added kernel to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26908
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
6.6.35.1-5 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
6.6.35.1-5 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26908 None

CVE-2023-46219 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-46219
MITRE
NVD

Issuing CNA: support@hackerone.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Dec-23    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    23-Oct-24    

Added mysql to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0 Added cmake to Azure Linux 3.0


3.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0


4.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0


5.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-46219
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cmake (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
3.29.6-1
8.0.40-1
None
Azure Linux 3.0 x64 cmake (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
3.29.6-1
8.0.40-1
None
CBL Mariner 2.0 ARM curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
8.5.0-1
8.0.40-1
None
CBL Mariner 2.0 x64 curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
8.5.0-1
8.0.40-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-46219 None

CVE-2022-1941 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-1941
MITRE
NVD

Issuing CNA: cve-coordination@google.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    30-Jun-24    

Information published.


1.0    18-Aug-24    

Information published.


2.0    15-Oct-24    

Added pytorch to Azure Linux 3.0 Added tensorflow to Azure Linux 3.0 Added keras to Azure Linux 3.0 Added python-tensorboard to Azure Linux 3.0 Added protobuf to Azure Linux 3.0 Added grpc to Azure Linux 3.0 Added protobuf to CBL-Mariner 2.0


3.0    23-Oct-24    

Added mysql to CBL-Mariner 2.0 Added protobuf to CBL-Mariner 2.0 Added pytorch to Azure Linux 3.0 Added tensorflow to Azure Linux 3.0 Added keras to Azure Linux 3.0 Added python-tensorboard to Azure Linux 3.0 Added protobuf to Azure Linux 3.0 Added grpc to Azure Linux 3.0


4.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added pytorch to Azure Linux 3.0 Added tensorflow to Azure Linux 3.0 Added keras to Azure Linux 3.0 Added python-tensorboard to Azure Linux 3.0 Added protobuf to Azure Linux 3.0 Added grpc to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0 Added protobuf to CBL-Mariner 2.0


5.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added pytorch to Azure Linux 3.0 Added tensorflow to Azure Linux 3.0 Added keras to Azure Linux 3.0 Added python-tensorboard to Azure Linux 3.0 Added protobuf to Azure Linux 3.0 Added grpc to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0 Added protobuf to CBL-Mariner 2.0


6.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added pytorch to Azure Linux 3.0 Added tensorflow to Azure Linux 3.0 Added keras to Azure Linux 3.0 Added python-tensorboard to Azure Linux 3.0 Added protobuf to Azure Linux 3.0 Added grpc to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0 Added protobuf to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-1941
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM grpc (CBL-Mariner)
keras (CBL-Mariner)
mysql (CBL-Mariner)
protobuf (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.62.0-2
3.1.1-1
8.0.40-1
25.3-1
None
Azure Linux 3.0 x64 grpc (CBL-Mariner)
keras (CBL-Mariner)
mysql (CBL-Mariner)
protobuf (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1.62.0-2
3.1.1-1
8.0.40-1
25.3-1
None
CBL Mariner 2.0 ARM mysql (CBL-Mariner)
protobuf (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.0.40-1
3.17.3-3
None
CBL Mariner 2.0 x64 mysql (CBL-Mariner)
protobuf (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.0.40-1
3.17.3-3
None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-1941 None

CVE-2024-2004 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-2004
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:3.5/TemporalScore:3.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


1.0    01-Oct-24    

Information published.


1.0    05-Oct-24    

Information published.


2.0    23-Oct-24    

Added mysql to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0 Added cmake to Azure Linux 3.0 Added curl to Azure Linux 3.0


3.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added curl to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0


4.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added curl to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0


5.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added cmake to Azure Linux 3.0 Added curl to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0 Added curl to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-2004
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 3.5
Temporal: 3.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.30.3-2
8.8.0-1
8.0.40-1
None
Azure Linux 3.0 x64 cmake (CBL-Mariner)
curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 3.5
Temporal: 3.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
3.30.3-2
8.8.0-1
8.0.40-1
None
CBL Mariner 2.0 ARM curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 3.5
Temporal: 3.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
8.8.0-1
8.0.40-1
None
CBL Mariner 2.0 x64 curl (CBL-Mariner)
mysql (CBL-Mariner)
Unknown Unknown Base: 3.5
Temporal: 3.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
8.8.0-1
8.0.40-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-2004 None

CVE-2024-20996 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20996
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20996
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20996 None

CVE-2024-21134 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21134
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21134
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21134 None

CVE-2024-21125 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21125
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21125
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21125 None

CVE-2024-21142 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21142
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21142
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21142 None

CVE-2024-21159 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21159
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21159
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21159 None

CVE-2024-21162 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21162
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21162
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21162 None

CVE-2024-21165 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21165
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21165
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21165 None

CVE-2024-21163 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21163
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21163
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21163 None

CVE-2024-21194 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21194
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21194
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21194 None

CVE-2024-21203 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21203
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21203
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21203 None

CVE-2024-21196 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21196
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21196
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21196 None

CVE-2024-21238 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21238
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21238
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21238 None

CVE-2024-21197 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21197
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21197
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21197 None

CVE-2024-21239 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21239
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21239
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21239 None

CVE-2024-21241 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21241
MITRE
NVD

Issuing CNA: secalert_us@oracle.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.9/TemporalScore:4.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Oct-24    

Information published.


2.0    25-Oct-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


3.0    09-Nov-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


4.0    04-Dec-24    

Added mysql to Azure Linux 3.0 Added mysql to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21241
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None
CBL Mariner 2.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: 4.9
Temporal: 4.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
8.0.40-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21241 None

CVE-2024-1545 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-1545
MITRE
NVD

Issuing CNA: facts@wolfssl.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-1545
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mariadb (CBL-Mariner) Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
10.11.10-1 Unknown None
Azure Linux 3.0 x64 mariadb (CBL-Mariner) Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
10.11.10-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-1545 None

CVE-2023-6935 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-6935
MITRE
NVD

Issuing CNA: facts@wolfssl.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-6935
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mariadb (CBL-Mariner) Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
10.11.10-1 Unknown None
Azure Linux 3.0 x64 mariadb (CBL-Mariner) Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
10.11.10-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-6935 None

CVE-2024-50228 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-50228
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-50228
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
6.6.57.1-5 Unknown None
Azure Linux 3.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
6.6.57.1-5 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-50228 None

CVE-2024-25431 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-25431
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    20-Nov-24    

Information published.


2.0    26-Nov-24    

Added fluent-bit to Azure Linux 3.0 Added fluent-bit to CBL-Mariner 2.0


3.0    07-Dec-24    

Added fluent-bit to Azure Linux 3.0 Added fluent-bit to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-25431
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM fluent-bit (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
3.1.9-1 Unknown None
Azure Linux 3.0 x64 fluent-bit (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
3.1.9-1 Unknown None
CBL Mariner 2.0 ARM fluent-bit (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2.2.3-5 Unknown None
CBL Mariner 2.0 x64 fluent-bit (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2.2.3-5 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-25431 None

CVE-2023-50495 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-50495
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-50495
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM ncurses (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.4-3 Unknown None
CBL Mariner 2.0 x64 ncurses (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
6.4-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-50495 None

CVE-2023-6936 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-6936
MITRE
NVD

Issuing CNA: facts@wolfssl.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-6936
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mariadb (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
10.11.10-1 Unknown None
Azure Linux 3.0 x64 mariadb (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
10.11.10-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-6936 None

CVE-2024-5814 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-5814
MITRE
NVD

Issuing CNA: facts@wolfssl.com

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-5814
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mariadb (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
10.11.10-1 Unknown None
Azure Linux 3.0 x64 mariadb (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
10.11.10-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-5814 None

CVE-2012-2677 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2012-2677
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2012-2677
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mysql (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
8.0.40-4 Unknown None
Azure Linux 3.0 x64 mysql (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
8.0.40-4 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2012-2677 None

CVE-2024-2881 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-2881
MITRE
NVD

Issuing CNA: facts@wolfssl.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-2881
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mariadb (CBL-Mariner) Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
10.11.10-1 Unknown None
Azure Linux 3.0 x64 mariadb (CBL-Mariner) Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
10.11.10-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-2881 None

CVE-2023-40548 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40548
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:7.4
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


2.0    07-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.0    08-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.0    09-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.0    10-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40548
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
15.8-3 None
Azure Linux 3.0 x64 shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
15.8-3 None
CBL Mariner 2.0 ARM shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
15.8-1 None
CBL Mariner 2.0 x64 shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
15.8-1 None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40548 None

CVE-2019-14584 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-14584
MITRE
NVD

Issuing CNA: secure@intel.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


2.0    08-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


3.0    09-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


4.0    10-Dec-24    

Added shim-unsigned-aarch64 to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-14584
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim-unsigned-aarch64 (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
15.8-3 Unknown None
Azure Linux 3.0 x64 shim-unsigned-aarch64 (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
15.8-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-14584 None

CVE-2024-32610 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-32610
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


1.0    30-Jun-24    

Information published.


2.0    07-Dec-24    

Added hdf5 to CBL-Mariner 2.0 Added hdf5 to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-32610
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM hdf5 (CBL-Mariner) Unknown Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1.14.4.3-1 Unknown None
Azure Linux 3.0 x64 hdf5 (CBL-Mariner) Unknown Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1.14.4.3-1 Unknown None
CBL Mariner 2.0 ARM hdf5 (CBL-Mariner) Unknown Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1.14.4-1 Unknown None
CBL Mariner 2.0 x64 hdf5 (CBL-Mariner) Unknown Unknown None Base: 5.7
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1.14.4-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-32610 None

CVE-2023-42366 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-42366
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    20-Nov-24    

Information published.


2.0    07-Dec-24    

Added busybox to Azure Linux 3.0 Added busybox to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-42366
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM busybox (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.36.1-9 Unknown None
Azure Linux 3.0 x64 busybox (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.36.1-9 Unknown None
CBL Mariner 2.0 ARM busybox (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.35.0-12 Unknown None
CBL Mariner 2.0 x64 busybox (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1.35.0-12 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-42366 None

CVE-2024-1543 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-1543
MITRE
NVD

Issuing CNA: facts@wolfssl.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-1543
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mariadb (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
10.11.10-1 Unknown None
Azure Linux 3.0 x64 mariadb (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
10.11.10-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-1543 None

CVE-2024-5288 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-5288
MITRE
NVD

Issuing CNA: facts@wolfssl.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.1/TemporalScore:5.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-5288
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mariadb (CBL-Mariner) Unknown Unknown None Base: 5.1
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
10.11.10-1 Unknown None
Azure Linux 3.0 x64 mariadb (CBL-Mariner) Unknown Unknown None Base: 5.1
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
10.11.10-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-5288 None

CVE-2023-6937 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-6937
MITRE
NVD

Issuing CNA: facts@wolfssl.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-6937
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mariadb (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
10.11.10-1 Unknown None
Azure Linux 3.0 x64 mariadb (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
10.11.10-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-6937 None

CVE-2024-9355 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-9355
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-9355
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM golang (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
1.23.3-2 Unknown None
Azure Linux 3.0 x64 golang (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L
1.23.3-2 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-9355 None

CVE-2024-31852 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-31852
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    30-Jun-24    

Information published.


1.0    16-Aug-24    

Information published.


1.0    18-Aug-24    

Information published.


2.0    09-Nov-24    

Added libcxx to Azure Linux 3.0 Added rust to Azure Linux 3.0 Added llvm to Azure Linux 3.0 Added rust to CBL-Mariner 2.0


3.0    07-Dec-24    

Added rust to CBL-Mariner 2.0 Added libcxx to Azure Linux 3.0 Added llvm to Azure Linux 3.0 Added rust to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-31852
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM libcxx (CBL-Mariner)
llvm (CBL-Mariner)
rust (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
18.1.2-3
1.75.0-9
None
Azure Linux 3.0 x64 libcxx (CBL-Mariner)
llvm (CBL-Mariner)
rust (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
18.1.2-3
1.75.0-9
None
CBL Mariner 2.0 ARM rust (CBL-Mariner) Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1.72.0-8 Unknown None
CBL Mariner 2.0 x64 rust (CBL-Mariner) Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
1.72.0-8 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-31852 None

CVE-2022-4968 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-4968
MITRE
NVD

Issuing CNA: security@ubuntu.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-4968
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM netplan (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1.0.1-1 Unknown None
Azure Linux 3.0 x64 netplan (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1.0.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-4968 None

CVE-2024-5991 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-5991
MITRE
NVD

Issuing CNA: facts@wolfssl.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-5991
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM mariadb (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.11.10-1 Unknown None
Azure Linux 3.0 x64 mariadb (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
10.11.10-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-5991 None

CVE-2024-0134 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-0134
MITRE
NVD

Issuing CNA: psirt@nvidia.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.1/TemporalScore:4.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-0134
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM nvidia-container-toolkit (CBL-Mariner) Unknown Unknown None Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
1.17.1-1 Unknown None
Azure Linux 3.0 x64 nvidia-container-toolkit (CBL-Mariner) Unknown Unknown None Base: 4.1
Temporal: 4.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
1.17.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-0134 None

CVE-2022-28737 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-28737
MITRE
NVD

Issuing CNA: security@ubuntu.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


2.0    07-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


3.0    08-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


4.0    09-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


5.0    10-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-28737
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
15.8-3 None
Azure Linux 3.0 x64 shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
15.8-3 None
CBL Mariner 2.0 ARM shim (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
15.8-1 Unknown None
CBL Mariner 2.0 x64 shim (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
15.8-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-28737 None

CVE-2024-49767 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-49767
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-49767
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM python-werkzeug (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.3-2 Unknown None
Azure Linux 3.0 x64 python-werkzeug (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
3.0.3-2 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-49767 None

CVE-2023-40546 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40546
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


2.0    07-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.0    08-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.0    09-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.0    10-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40546
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-3 None
Azure Linux 3.0 x64 shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-3 None
CBL Mariner 2.0 ARM shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-1 None
CBL Mariner 2.0 x64 shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-1 None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40546 None

CVE-2023-40549 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40549
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


2.0    07-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


3.0    08-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


4.0    09-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


5.0    10-Dec-24    

Added shim to Azure Linux 3.0 Added shim-unsigned-aarch64 to Azure Linux 3.0 Added shim to CBL-Mariner 2.0 Added shim-unsigned-x64 to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40549
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-3 None
Azure Linux 3.0 x64 shim (CBL-Mariner)
shim-unsigned-aarch64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-3 None
CBL Mariner 2.0 ARM shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-1 None
CBL Mariner 2.0 x64 shim (CBL-Mariner)
shim-unsigned-x64 (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
15.8-1 None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40549 None

CVE-2023-40551 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40551
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.1/TemporalScore:5.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    11-Sep-24    

Information published.


2.0    07-Dec-24    

Added shim to Azure Linux 3.0 Added shim to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40551
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM shim (CBL-Mariner) Unknown Unknown None Base: 5.1
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
15.8-3 Unknown None
Azure Linux 3.0 x64 shim (CBL-Mariner) Unknown Unknown None Base: 5.1
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
15.8-3 Unknown None
CBL Mariner 2.0 ARM shim (CBL-Mariner) Unknown Unknown None Base: 5.1
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
15.8-1 Unknown None
CBL Mariner 2.0 x64 shim (CBL-Mariner) Unknown Unknown None Base: 5.1
Temporal: 5.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H
15.8-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40551 None

CVE-2024-47554 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-47554
MITRE
NVD

Issuing CNA: security@apache.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:4.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Nov-24    

Information published.


2.0    07-Dec-24    

Added apache-commons-io to CBL-Mariner 2.0 Added apache-commons-io to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-47554
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM apache-commons-io (CBL-Mariner) Unknown Unknown None Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
2.14.0-1 Unknown None
Azure Linux 3.0 x64 apache-commons-io (CBL-Mariner) Unknown Unknown None Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
2.14.0-1 Unknown None
CBL Mariner 2.0 ARM apache-commons-io (CBL-Mariner) Unknown Unknown None Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
2.14.0-1 Unknown None
CBL Mariner 2.0 x64 apache-commons-io (CBL-Mariner) Unknown Unknown None Base: 4.3
Temporal: 4.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
2.14.0-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-47554 None

CVE-2024-11234 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-11234
MITRE
NVD

Issuing CNA: security@php.net

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:7.2
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-11234
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM php (CBL-Mariner) Unknown Unknown None Base: 7.2
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
8.1.31-1 Unknown None
CBL Mariner 2.0 x64 php (CBL-Mariner) Unknown Unknown None Base: 7.2
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N
8.1.31-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-11234 None

CVE-2024-27418 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-27418
MITRE
NVD

Issuing CNA: cve@kernel.org

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-May-24    

Information published.


2.0    09-Dec-24    

Added hyperv-daemons to CBL-Mariner 2.0


3.0    10-Dec-24    

Added hyperv-daemons to CBL-Mariner 2.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-27418
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
5.15.158.2-1 Unknown None
CBL Mariner 2.0 x64 hyperv-daemons (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
5.15.158.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-27418 None

CVE-2024-11233 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-11233
MITRE
NVD

Issuing CNA: security@php.net

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:8.2
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Dec-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-11233
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM php (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
8.1.31-1 Unknown None
CBL Mariner 2.0 x64 php (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
8.1.31-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-11233 None

CVE-2023-52890 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-52890
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.5/TemporalScore:4.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    30-Jun-24    

Information published.


1.0    29-Aug-24    

Information published.


1.0    30-Aug-24    

Information published.


1.0    31-Aug-24    

Information published.


1.0    01-Sep-24    

Information published.


1.0    02-Sep-24    

Information published.


1.0    03-Sep-24    

Information published.


1.0    05-Sep-24    

Information published.


1.0    06-Sep-24    

Information published.


1.0    07-Sep-24    

Information published.


1.0    08-Sep-24    

Information published.


1.0    11-Sep-24    

Information published.


2.0    10-Dec-24    

Added ntfs-3g to CBL-Mariner 2.0 Added ntfs-3g to Azure Linux 3.0


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-52890
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM ntfs-3g (CBL-Mariner) Unknown Unknown None Base: 4.5
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
2022.10.3-2 Unknown None
Azure Linux 3.0 x64 ntfs-3g (CBL-Mariner) Unknown Unknown None Base: 4.5
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
2022.10.3-2 Unknown None
CBL Mariner 2.0 ARM ntfs-3g (CBL-Mariner) Unknown Unknown None Base: 4.5
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
2022.10.3-2 Unknown None
CBL Mariner 2.0 x64 ntfs-3g (CBL-Mariner) Unknown Unknown None Base: 4.5
Temporal: 4.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
2022.10.3-2 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-52890 None