Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
Microsoft.NET and Visual Studio CVE-2024-30045 .NET and Visual Studio Remote Code Execution Vulnerability
MicrosoftAzure Migrate CVE-2024-30053 Azure Migrate Cross-Site Scripting Vulnerability
MicrosoftMicrosoft Bing CVE-2024-30041 Microsoft Bing Search Spoofing Vulnerability
MicrosoftMicrosoft Brokering File System CVE-2024-30007 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Dynamics 365 Customer Insights CVE-2024-30048 Dynamics 365 Customer Insights Spoofing Vulnerability
MicrosoftMicrosoft Dynamics 365 Customer Insights CVE-2024-30047 Dynamics 365 Customer Insights Spoofing Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-4558 Chromium: CVE-2024-4558 Use after free in ANGLE
ChromeMicrosoft Edge (Chromium-based) CVE-2024-4331 Chromium: CVE-2024-4331 Use after free in Picture In Picture
ChromeMicrosoft Edge (Chromium-based) CVE-2024-4671 Chromium: CVE-2024-4671 Use after free in Visuals
MicrosoftMicrosoft Edge (Chromium-based) CVE-2024-30055 Microsoft Edge (Chromium-based) Spoofing Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-4368 Chromium: CVE-2024-4368 Use after free in Dawn
ChromeMicrosoft Edge (Chromium-based) CVE-2024-4559 Chromium: CVE-2024-4559 Heap buffer overflow in WebAudio
MicrosoftMicrosoft Intune CVE-2024-30059 Microsoft Intune for Android Mobile Application Management Tampering Vulnerability
MicrosoftMicrosoft Office Excel CVE-2024-30042 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2024-30044 Microsoft SharePoint Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2024-30043 Microsoft SharePoint Server Information Disclosure Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-30006 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Windows SCSI Class System File CVE-2024-29994 Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability
MicrosoftMicrosoft Windows Search Component CVE-2024-30033 Windows Search Service Elevation of Privilege Vulnerability
MicrosoftPower BI CVE-2024-30054 Microsoft Power BI Client JavaScript SDK Information Disclosure Vulnerability
MicrosoftVisual Studio CVE-2024-30046 Visual Studio Denial of Service Vulnerability
GithubVisual Studio CVE-2024-32004 GitHub: CVE-2024-32004 Remote Code Execution while cloning special-crafted local repositories
GithubVisual Studio CVE-2024-32002 CVE-2024-32002 Recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution
MicrosoftWindows Cloud Files Mini Filter Driver CVE-2024-30034 Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
MicrosoftWindows CNG Key Isolation Service CVE-2024-30031 Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2024-29996 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2024-30037 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2024-30025 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Cryptographic Services CVE-2024-30020 Windows Cryptographic Services Remote Code Execution Vulnerability
MicrosoftWindows Cryptographic Services CVE-2024-30016 Windows Cryptographic Services Information Disclosure Vulnerability
MicrosoftWindows Deployment Services CVE-2024-30036 Windows Deployment Services Information Disclosure Vulnerability
MicrosoftWindows DHCP Server CVE-2024-30019 DHCP Server Service Denial of Service Vulnerability
MicrosoftWindows DWM Core Library CVE-2024-30008 Windows DWM Core Library Information Disclosure Vulnerability
MicrosoftWindows DWM Core Library CVE-2024-30051 Windows DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows DWM Core Library CVE-2024-30035 Windows DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows DWM Core Library CVE-2024-30032 Windows DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows Hyper-V CVE-2024-30011 Windows Hyper-V Denial of Service Vulnerability
MicrosoftWindows Hyper-V CVE-2024-30017 Windows Hyper-V Remote Code Execution Vulnerability
MicrosoftWindows Hyper-V CVE-2024-30010 Windows Hyper-V Remote Code Execution Vulnerability
MicrosoftWindows Kernel CVE-2024-30018 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Mark of the Web (MOTW) CVE-2024-30050 Windows Mark of the Web Security Feature Bypass Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30002 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-29997 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30003 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30012 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-29999 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-29998 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30000 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30005 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30004 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30021 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30001 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows MSHTML Platform CVE-2024-30040 Windows MSHTML Platform Security Feature Bypass Vulnerability
MicrosoftWindows NTFS CVE-2024-30027 NTFS Elevation of Privilege Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-30039 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30009 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30024 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30015 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30029 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30023 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30014 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30022 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Task Scheduler CVE-2024-26238 Microsoft PLUGScheduler Scheduled Task Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - GRFX CVE-2024-30030 Win32k Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - ICOMP CVE-2024-30038 Win32k Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - ICOMP CVE-2024-30049 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - ICOMP CVE-2024-30028 Win32k Elevation of Privilege Vulnerability

CVE-2024-32002 - CVE-2024-32002 Recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-32002
MITRE
NVD

Issuing CNA: Github

CVE Title: CVE-2024-32002 Recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution
CVSS:

CVSS:3.1 Highest BaseScore:9.0/TemporalScore:7.8
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why is this GitHub CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in MinGit software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-32002
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Release Notes (Security Update) Important Remote Code Execution None Base: 9.0
Temporal: 7.8
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.9.62 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-32002 Anonymous


CVE-2024-29996 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29996
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29996
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29996 Seunghoe Kim and Daejin Lee of S2W Inc.


CVE-2024-29997 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29997
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29997
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29997 B1aN


CVE-2024-29998 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29998
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29998
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29998 B1aN


CVE-2024-29999 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29999
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29999
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29999 B1aN


CVE-2024-30000 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30000
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30000
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30000 B1aN


CVE-2024-30001 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30001
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30001
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30001 B1aN


CVE-2024-30002 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30002
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30002
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30002 B1aN


CVE-2024-30003 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30003
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30003
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30003 B1aN


CVE-2024-30004 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30004
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30004
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30004 B1aN


CVE-2024-30005 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30005
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30005
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30005 B1aN


CVE-2024-30006 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30006
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30006
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30006 Anonymous


CVE-2024-30007 - Microsoft Brokering File System Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30007
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could potentially gain the ability to authenticate against a remote host using the current user’s credentials.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by taking advantage of a security oversight in the driver’s management of network path validations, which could circumvent the established security protocols designed to safeguard user credentials during application interactions with remote hosts. This could potentially grant unauthorized access to network resources and facilitate the execution of unauthorized actions under the assumed identity of a legitimate user.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30007
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30007 Naceri with MSRC Vulnerabilities & Mitigations


CVE-2024-30008 - Windows DWM Core Library Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30008
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DWM Core Library Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could view heap memory from a privileged process running on the server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30008
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Information Disclosure 5036925 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Information Disclosure 5036925 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Information Disclosure 5036894
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Information Disclosure 5036894
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Information Disclosure 5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Information Disclosure 5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Information Disclosure
5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Information Disclosure
5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2016 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Information Disclosure 5036909
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Information Disclosure 5036909
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Information Disclosure 5036910 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30008 Zhang WangJunJie, He YiSheng with Hillstone Network Security Research Institute


CVE-2024-30009 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30009
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30009
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30009 Anonymous


CVE-2024-30010 - Windows Hyper-V Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30010
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

The attacker must be authenticated to be able to exploit this vulnerability.


How would an attacker exploit this vulnerability?

An attacker who successfully exploited this vulnerability could send malformed packets to Hyper-V Replica endpoints on the host from a remote machine.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30010
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30010 ziming zhang with Ant Security Light-Year Lab


CVE-2024-30011 - Windows Hyper-V Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30011
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30011
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5037778 (Monthly Rollup) Important Denial of Service 5036969 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Denial of Service 5036969 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Denial of Service 5036960 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Denial of Service 5036960 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Denial of Service 5036899 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Denial of Service 5036899 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Denial of Service 5036896 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Denial of Service 5036896 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Denial of Service 5036909
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Denial of Service 5036909
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Denial of Service 5036910 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30011 ziming zhang with Ant Security Light-Year Lab


CVE-2024-30012 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30012
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30012
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30012 B1aN


CVE-2024-30014 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30014
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelTemporary Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30014
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30014 Anonymous


QingHe Xie and FangMing Gu


CVE-2024-30015 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30015
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30015
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30015 Anonymous


Qinghe Xie


Fangming Gu


CVE-2024-30016 - Windows Cryptographic Services Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30016
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cryptographic Services Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

For successful exploitation, a locally authenticated attacker needs to send a specially crafted request to the cryptography provider's vulnerable function.


What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30016
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Information Disclosure 5036925 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Information Disclosure 5036925 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Information Disclosure 5036894
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Information Disclosure 5036894
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Information Disclosure 5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Information Disclosure 5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Information Disclosure
5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Information Disclosure
5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Information Disclosure 5036932
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Information Disclosure 5036932
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Information Disclosure 5036932
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Information Disclosure 5036932
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Information Disclosure 5036967
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Information Disclosure 5036967
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Information Disclosure 5036969 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Information Disclosure 5036969 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Information Disclosure 5036960 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Information Disclosure 5036960 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Information Disclosure 5036909
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Information Disclosure 5036909
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Information Disclosure 5036910 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30016 k0shl with Kunlun Lab


CVE-2024-30017 - Windows Hyper-V Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30017
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

The attacker must be authenticated to be able to exploit this vulnerability.


How would an attacker exploit this vulnerability?

This vulnerability would require an authenticated attacker on a guest VM to send specially crafted file operation requests on the VM to hardware resources on the VM which could result in remote code execution on the host server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30017
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30017 ziming zhang with Ant Security Light-Year Lab


CVE-2024-30018 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30018
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30018
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30018 Naceri with MSRC Vulnerabilities & Mitigations


CVE-2024-30019 - DHCP Server Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30019
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DHCP Server Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30019
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Denial of Service 5036932
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Denial of Service 5036932
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Denial of Service 5036932
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Denial of Service 5036932
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Denial of Service 5036967
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Denial of Service 5036967
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Denial of Service 5036969 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Denial of Service 5036969 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Denial of Service 5036960 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Denial of Service 5036960 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Denial of Service 5036899 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Denial of Service 5036899 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Denial of Service 5036896 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Denial of Service 5036896 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Denial of Service 5036909
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Denial of Service 5036909
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Denial of Service 5036910 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30019 Anonymous


CVE-2024-30020 - Windows Cryptographic Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30020
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cryptographic Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack.


How could an attacker exploit this vulnerability?

For successful exploitation, a malicious certificate needs to be imported on an affected system. An attacker could upload a certificate to a service that processes or imports certificates, or an attacker could convince an authenticated user to import a certificate on their system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30020
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30020 Erik Egsgard with Field Effect Software


CVE-2024-30021 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30021
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30021
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30021 B1aN


CVE-2024-30022 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30022
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30022
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30022 QingHe Xie


FangMing Gu


Anonymous


Anonymous


CVE-2024-30023 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30023
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30023
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30023 Anonymous


Qinghe Xie


Fangming Gu


CVE-2024-30044 - Microsoft SharePoint Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30044
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

An authenticated attacker with Site Owner permission can use the vulnerability to inject arbitrary code and execute this code in the context of SharePoint Server.


How could an attacker exploit the vulnerability?

An authenticated attacker with Site Owner permissions or higher could upload a specially crafted file to the targeted Sharepoint Server and craft specialized API requests to trigger deserialization of file's parameters. This would enable the attacker to perform remote code execution in the context of the Sharepoint Server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30044
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002598 (Security Update) Critical Remote Code Execution 5002583 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5448.1000 Maybe None
Microsoft SharePoint Server 2019 5002596 (Security Update) Critical Remote Code Execution 5002580 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10409.20047 Maybe None
Microsoft SharePoint Server Subscription Edition 5002599 (Security Update) Critical Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.17328.20292 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30044 Anonymous


CVE-2024-30050 - Windows Mark of the Web Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30050
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mark of the Web Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:5.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityLow
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L) and some loss of availability (A:L). What does that mean for this vulnerability?

An attacker can craft a malicious file that would evade Mark of the Web (MOTW) defenses, resulting in a limited loss of integrity and availability of security features such as Protected View in Microsoft Office, which rely on MOTW tagging.


How could an attacker exploit the vulnerability?

To exploit this vulnerability, an attacker could host a file on an attacker-controlled server, then convince a targeted user to download and open the file. This could allow the attacker to interfere with the Mark of the Web functionality.

Please see Additional information about Mark of the Web for further clarification


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Moderate Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30050
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Moderate Security Feature Bypass 5036925 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Moderate Security Feature Bypass 5036925 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Moderate Security Feature Bypass 5036899 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Moderate Security Feature Bypass 5036899 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Moderate Security Feature Bypass 5036896 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Moderate Security Feature Bypass 5036896 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Moderate Security Feature Bypass 5036896 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Moderate Security Feature Bypass 5036892
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Moderate Security Feature Bypass 5036892
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Moderate Security Feature Bypass 5036892
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Moderate Security Feature Bypass
5036892
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Moderate Security Feature Bypass
5036892
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Moderate Security Feature Bypass
5036892
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Moderate Security Feature Bypass 5036894
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Moderate Security Feature Bypass 5036894
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Moderate Security Feature Bypass 5036893
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Moderate Security Feature Bypass 5036893
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Moderate Security Feature Bypass
5036893
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Moderate Security Feature Bypass
5036893
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Moderate Security Feature Bypass 5036932
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Moderate Security Feature Bypass 5036932
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Moderate Security Feature Bypass 5036932
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Moderate Security Feature Bypass 5036932
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Moderate Security Feature Bypass 5036967
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Moderate Security Feature Bypass 5036967
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Moderate Security Feature Bypass 5036969 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Moderate Security Feature Bypass 5036969 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Moderate Security Feature Bypass 5036960 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Moderate Security Feature Bypass 5036960 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Moderate Security Feature Bypass 5036899 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Moderate Security Feature Bypass 5036899 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Moderate Security Feature Bypass 5036896 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Moderate Security Feature Bypass 5036896 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Moderate Security Feature Bypass 5036909
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Moderate Security Feature Bypass 5036909
Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Moderate Security Feature Bypass 5036910 Base: 5.4
Temporal: 5.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L/E:F/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30050 dwbzn with Aura Information Security


CVE-2024-30053 - Azure Migrate Cross-Site Scripting Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30053
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Migrate Cross-Site Scripting Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What actions do customers need to take to protect themselves from this vulnerability?

The vulnerability has been mitigated by the latest change to the Azure Migrate Appliance. See here for information on how to ensure your Azure Migrate Appliance can get the latest Azure Migrate Agent and ConfigManager updates.


According to the CVSS metric, the attack vector is Network (AV:N), the attack complexity is Low (AC:L) and the privileges required is None (PR:L). What does this mean for this vulnerability?

An authenticated attacker could store a malicious JavaScript code in a parameter. This payload would get stored and execute a Stores-XSS when the webpage is rendered.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30053
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Migrate Release Notes (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
6.1.294.1008 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30053 Andrea Piazza


CVE-2024-30059 - Microsoft Intune for Android Mobile Application Management Tampering Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30059
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Intune for Android Mobile Application Management Tampering Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityLow
Temporal score metrics
Exploit Code MaturityHigh
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker requires access to a rooted target device and must disable certain components of the Intune Mobile Application Manager which do not fully impact availability. An attacker could then gain access to sensitive files based on the targeted device's privileges but does not provide the ability to alter data.


How do I know if I am affected by this vulnerability?

Customers using Microsoft Intune Mobile Application Management features enabled by the Intune App SDK for Android are affected by this vulnerability. Customers who do not have auto-updates enabled need to update the Intune Company Portal to version 5.0.6215.0 or higher to be protected from this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Tampering

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30059
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Intune Mobile Application Management for Android Release Notes (Security Update) Important Tampering None Base: 6.1
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L/E:H/RL:O/RC:C
5.0.6215.0 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30059 Gee Sung with Aon


CVE-2024-4558 - Chromium: CVE-2024-4558 Use after free in ANGLE

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-4558
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-4558 Use after free in ANGLE
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 124.0.2478.97 5/10/2024 124.0.6367.155/.156

Mitigations:
None
Workarounds:
None
Revision:
1.0    10-May-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-4558
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
124.0.2478.97 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-4558 None

CVE-2024-4559 - Chromium: CVE-2024-4559 Heap buffer overflow in WebAudio

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-4559
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-4559 Heap buffer overflow in WebAudio
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 124.0.2478.97 5/10/2024 124.0.6367.155/.156

Mitigations:
None
Workarounds:
None
Revision:
1.0    10-May-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-4559
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
124.0.2478.97 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-4559 None

CVE-2024-30055 - Microsoft Edge (Chromium-based) Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30055
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L)? What does that mean for this vulnerability?

Limited information from the victim's browser associated with the vulnerable URL can be sent to the attacker by the malicious code.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 124.0.2478.97 5/10/2024 124.0.6367.155/.156

Mitigations:
None
Workarounds:
None
Revision:
1.0    10-May-24    

Information published.


Low Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30055
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Low Spoofing None Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
124.0.2478.97 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30055 Om Apip with ITSEC Asia


cloud


CVE-2024-4671 - Chromium: CVE-2024-4671 Use after free in Visuals

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-4671
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-4671 Use after free in Visuals
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.

Google is aware that an exploit for CVE-2024-4671 exists in the wild.


FAQ:
Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 124.0.2478.97 5/10/2024 124.0.6367.155/.156

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    10-May-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-4671
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
124.0.2478.97 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-4671 None

CVE-2024-26238 - Microsoft PLUGScheduler Scheduled Task Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26238
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft PLUGScheduler Scheduled Task Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


How do I protect myself from this vulnerability?

Customers running Windows 10 version 2004 through 20H2 need to have KB 5001716 installed to be protected from this vulnerability. This update will be downloaded and installed automatically from Windows update on all in-support versions of Windows 10. It is also offered to Windows Update Client for some devices that have not installed the most recent updates. If you are running a version of Windows10 that has reached the end of its support lifecycle, or if you have not installed the latest updates in Settings select Windows Update and install KB5001716 if it is listed as available for you to install.

Note that it is crucial to install the latest version of Windows to continue receiving security fixes. When installed, update KB5001716 may prompt feature updates to ensure device security and functionality or display a notification informing of the problems. See (KB5001716: Update for Windows Update Service components - Microsoft Support) for more details


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26238
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26238 Guillaume André with Synacktiv


CVE-2024-29994 - Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29994
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29994
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29994 Wen of KunlunLab


CVE-2024-30024 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30024
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30024
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30024 Anonymous


Qinghe Xie


Fangming Gu


CVE-2024-30025 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30025
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30025
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30025 Tianyao Xu(@sat0rn3)


CVE-2024-30027 - NTFS Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30027
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NTFS Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30027
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30027 Anonymous


CVE-2024-30028 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30028
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

A local, authenticated attacker could gain elevated local system or administrator privileges through a vulnerability in the Win32k.sys driver.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30028
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30028 Guopengfei from Codesafe Team of Legendsec at Qi'anxin Group


CVE-2024-30029 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30029
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30029
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30029 Qinghe Xie


Fangming Gu


Anonymous


CVE-2024-30030 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30030
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is Low (PR:L). What does that mean for this vulnerability?

To exploit this vulnerability an attacker must have an account with the User role assigned.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30030
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30030 Bryan Gonzalez from Ocelot Team & Metabase Q


CVE-2024-30031 - Windows CNG Key Isolation Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30031
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30031
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30031 Microsoft Offensive Research & Security Engineering


CVE-2024-30032 - Windows DWM Core Library Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30032
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30032
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2016 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30032 Zhang WangJunJie, He YiSheng with Hillstone Network Security Research Institute


CVE-2024-30033 - Windows Search Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30033
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Search Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30033
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30033 HeeChan Kim (@heegong123) of THEORI working with Trend Micro Zero Day Initiative


CVE-2024-30034 - Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30034
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain kernel memory content.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30034
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Information Disclosure 5036894
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Information Disclosure 5036894
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Information Disclosure 5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Information Disclosure 5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Information Disclosure
5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Information Disclosure
5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Information Disclosure 5036909
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Information Disclosure 5036909
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Information Disclosure 5036910 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30034 Wei Lei and Sergey Kornienko (@b1thvn_) of PixiePoint Security working with Trend Micro Zero Day Initiative


CVE-2024-30035 - Windows DWM Core Library Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30035
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30035
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30035 Zhang WangJunJie, He YiSheng with Hillstone Network Security Research Institute


CVE-2024-30036 - Windows Deployment Services Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30036
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Deployment Services Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is file content.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30036
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Information Disclosure 5036932
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Information Disclosure 5036932
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Information Disclosure 5036932
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Information Disclosure 5036932
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Information Disclosure 5036967
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Information Disclosure 5036967
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Information Disclosure 5036969 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Information Disclosure 5036969 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Information Disclosure 5036960 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Information Disclosure 5036960 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Information Disclosure 5036899 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Information Disclosure 5036899 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Information Disclosure 5036896 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Information Disclosure 5036896 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Information Disclosure 5036909
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Information Disclosure 5036909
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30036 ziming zhang with Ant Security Light-Year Lab


CVE-2024-30037 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30037
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30037
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30037 HackInside (Yongil Lee, Ingyu Tae, Louis Hur) working with Trend Micro


Anonymous


CVE-2024-30038 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30038
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

A local, authenticated attacker could gain elevated local system or administrator privileges through a vulnerability in the Win32k.sys driver.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30038
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2012 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30038 Microsoft Offensive Research & Security Engineering


CVE-2024-30039 - Windows Remote Access Connection Manager Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30039
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30039
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Information Disclosure 5036925 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Information Disclosure 5036925 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Information Disclosure 5036894
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Information Disclosure 5036894
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Information Disclosure 5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Information Disclosure 5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Information Disclosure
5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Information Disclosure
5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Information Disclosure 5036932
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Information Disclosure 5036932
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Information Disclosure 5036932
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Information Disclosure 5036932
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Information Disclosure 5036967
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Information Disclosure 5036967
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Information Disclosure 5036969 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Information Disclosure 5036969 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Information Disclosure 5036960 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Information Disclosure 5036960 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Information Disclosure 5036909
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Information Disclosure 5036909
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Information Disclosure 5036910 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30039 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2024-30040 - Windows MSHTML Platform Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30040
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows MSHTML Platform Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.2
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

This vulnerability bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE controls.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker would have to convince the user to load a malicious file onto a vulnerable system, typically by way of an enticement in an Email or Instant Messenger message, and then convince the user to manipulate the specially crafted file, but not necessarily click or open the malicious file.


How could an attacker exploit this vulnerability?

An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through convincing a user to open a malicious document at which point the attacker could execute arbitrary code in the context of the user.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30040
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Security Feature Bypass 5036925 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Security Feature Bypass 5036925 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Security Feature Bypass 5036899 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Security Feature Bypass 5036899 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Security Feature Bypass 5036896 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Security Feature Bypass 5036896 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Security Feature Bypass 5036896 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Security Feature Bypass 5036892
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Security Feature Bypass 5036892
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Security Feature Bypass 5036892
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Security Feature Bypass
5036892
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Security Feature Bypass
5036892
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Security Feature Bypass
5036892
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Security Feature Bypass 5036894
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Security Feature Bypass 5036894
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Security Feature Bypass 5036893
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Security Feature Bypass 5036893
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Security Feature Bypass
5036893
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Security Feature Bypass
5036893
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2016 5037763 (Security Update) Important Security Feature Bypass 5036899 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Security Feature Bypass 5036899 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Security Feature Bypass 5036896 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Security Feature Bypass 5036896 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5036909
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5036909
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Security Feature Bypass 5036910 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30040 None

CVE-2024-30041 - Microsoft Bing Search Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30041
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Bing Search Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.4/TemporalScore:4.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


How do I get the update for Microsoft Bing Search for iOS?

  1. Tap the Settings icon
  2. Tap the** iTunes & App Store**
  3. Turn on AUTOMATIC DOWNLOADS for Apps

Alternatively

  1. Tap the** App Store** icon
  2. Scroll down to find Bing: Chat with AI & GPT-4
  3. Tap the Update button

According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L)? What does that mean for this vulnerability?

Limited information from the victim's browser associated with the vulnerable URL can be sent to the attacker by the malicious code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30041
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Bing Search for iOS Release Notes (Security Update) Important Spoofing None Base: 5.4
Temporal: 4.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
28.2.000000000 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30041 Anonymous


CVE-2024-30042 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30042
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30042
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Excel 2016 (32-bit edition) 5002587 (Security Update) Important Remote Code Execution 5002536 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5448.1000 Maybe None
Microsoft Excel 2016 (64-bit edition) 5002587 (Security Update) Important Remote Code Execution 5002536 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5448.1000 Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.85.24051214 Maybe None
Office Online Server 5002503 (Security Update) Important Remote Code Execution 5002470 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10410.20003 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30042 Quan Jin with DBAPPSecurity WeBin Lab


CVE-2024-30043 - Microsoft SharePoint Server Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30043
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Server Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is file content. The scope of file content which could be accessed is dependent on the privileges of compromised user.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30043
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002598 (Security Update) Important Information Disclosure 5002583 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.5448.1000 Maybe None
Microsoft SharePoint Server 2019 5002596 (Security Update) Important Information Disclosure 5002580 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.10409.20047 Maybe None
Microsoft SharePoint Server Subscription Edition 5002599 (Security Update) Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.17328.20292 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30043 Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative


CVE-2024-30045 - .NET and Visual Studio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30045
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET and Visual Studio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.3/TemporalScore:5.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:L). What does that mean for this vulnerability?

While we cannot rule out the impact to Confidentiality, Integrity, and Availability, the ability to exploit this vulnerability by itself is limited. An attacker would need to combine this with other vulnerabilities to perform an attack.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of this vulnerability requires that a user trigger the payload in the application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30045
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 7.0 5038351 (Security Update) Important Remote Code Execution None Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C
7.0.19 Maybe None
.NET 8.0 5038352 (Security Update) Important Remote Code Execution None Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C
8.0.5 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C
17.4.19 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C
17.6.15 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C
17.8.10 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C
17.9.7 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30045 None

CVE-2024-30046 - Visual Studio Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30046
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Visual Studio Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.2
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely Yes No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30046
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Denial of Service None Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
17.4.19 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Denial of Service None Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
17.6.15 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Denial of Service None Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
17.8.10 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Denial of Service None Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
17.9.7 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30046 None

CVE-2024-30047 - Dynamics 365 Customer Insights Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30047
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Dynamics 365 Customer Insights Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The user would need to access the URL of the malicious website, which could spoof the content of a legitimate website, and then click a popup displayed on that site.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


How do I get the update for Customer Insights - Journeys?

Customer Insights - Journeys updates are pushed to all customers automatically. Customer Insights - Journeys follows a phased deployment approach aligned with the platform deployment schedule. You can also update your solutions manually for early validations. Manual updates allow customers to apply and test updates on a sandbox instance before applying them to a production system. See Keep Dynamics 365 Customer Insights - Journeys up to date for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30047
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Dynamics 365 Customer Insights Release Notes (Security Update) Important Spoofing None Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
1.38813.80 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30047 Niraj Mahajan


Tomer Nahum with Semperis


CVE-2024-30048 - Dynamics 365 Customer Insights Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30048
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Dynamics 365 Customer Insights Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to navigate to a page with malicious content to be compromised by the attacker.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


How do I get the update for Customer Insights - Journeys?

Customer Insights - Journeys updates are pushed to all customers automatically. Customer Insights - Journeys follows a phased deployment approach aligned with the platform deployment schedule. You can also update your solutions manually for early validations. Manual updates allow customers to apply and test updates on a sandbox instance before applying them to a production system. See Keep Dynamics 365 Customer Insights - Journeys up to date for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30048
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Dynamics 365 Customer Insights Release Notes (Security Update) Important Spoofing None Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
1.38813.80 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30048 NGO VAN TU (@tusnj)


CVE-2024-30049 - Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30049
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30049
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30049 Anonymous


CVE-2024-30051 - Windows DWM Core Library Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30051
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected Yes Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30051
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2016 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30051 Vlad Stolyarov and Benoit Sevens of Google Threat Analysis Group Bryce Abdo and Adam Brunner of Google Mandiant


Quan Jin with DBAPPSecurity WeBin Lab Guoxian Zhong with DBAPPSecurity WeBin Lab


Mert Degirmenci and Boris Larin with Kaspersky


CVE-2024-32004 - GitHub: CVE-2024-32004 Remote Code Execution while cloning special-crafted local repositories

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-32004
MITRE
NVD

Issuing CNA: Github

CVE Title: GitHub: CVE-2024-32004 Remote Code Execution while cloning special-crafted local repositories
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why is this GitHub CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in MinGit software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-32004
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Release Notes (Security Update) Important Remote Code Execution None Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.9.62 Maybe None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Remote Code Execution None Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.36 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
17.4.19 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
17.6.15 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.10 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
17.9.7 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-32004 Anonymous


CVE-2024-30054 - Microsoft Power BI Client JavaScript SDK Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30054
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Power BI Client JavaScript SDK Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to navigate to a page with malicious content to be compromised by the attacker.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30054
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
PowerBI-client JS SDK Release Notes (Security Update) Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
2.23.1 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30054 Marcelo Takizawa with itigo


CVE-2024-4331 - Chromium: CVE-2024-4331 Use after free in Picture In Picture

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-4331
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-4331 Use after free in Picture In Picture
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 124.0.2478.80 5/2/2024 124.0.6367.118/.119

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-May-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-4331
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
124.0.2478.80 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-4331 None

CVE-2024-4368 - Chromium: CVE-2024-4368 Use after free in Dawn

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-4368
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-4368 Use after free in Dawn
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 124.0.2478.80 5/2/2024 124.0.6367.118/.119

Mitigations:
None
Workarounds:
None
Revision:
1.0    02-May-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-4368
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
124.0.2478.80 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-4368 None