Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
Microsoft.NET and Visual Studio CVE-2024-30045 .NET and Visual Studio Remote Code Execution Vulnerability
MicrosoftAzure Migrate CVE-2024-30053 Azure Migrate Cross-Site Scripting Vulnerability
MicrosoftMicrosoft Bing CVE-2024-30041 Microsoft Bing Search Spoofing Vulnerability
MicrosoftMicrosoft Brokering File System CVE-2024-30007 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Dynamics 365 Customer Insights CVE-2024-30048 Dynamics 365 Customer Insights Spoofing Vulnerability
MicrosoftMicrosoft Dynamics 365 Customer Insights CVE-2024-30047 Dynamics 365 Customer Insights Spoofing Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-4558 Chromium: CVE-2024-4558 Use after free in ANGLE
ChromeMicrosoft Edge (Chromium-based) CVE-2024-4331 Chromium: CVE-2024-4331 Use after free in Picture In Picture
ChromeMicrosoft Edge (Chromium-based) CVE-2024-4671 Chromium: CVE-2024-4671 Use after free in Visuals
MicrosoftMicrosoft Edge (Chromium-based) CVE-2024-30055 Microsoft Edge (Chromium-based) Spoofing Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-4368 Chromium: CVE-2024-4368 Use after free in Dawn
ChromeMicrosoft Edge (Chromium-based) CVE-2024-4559 Chromium: CVE-2024-4559 Heap buffer overflow in WebAudio
MicrosoftMicrosoft Intune CVE-2024-30059 Microsoft Intune for Android Mobile Application Management Tampering Vulnerability
MicrosoftMicrosoft Office Excel CVE-2024-30042 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2024-30044 Microsoft SharePoint Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2024-30043 Microsoft SharePoint Server Information Disclosure Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-30006 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Windows SCSI Class System File CVE-2024-29994 Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability
MicrosoftMicrosoft Windows Search Component CVE-2024-30033 Windows Search Service Elevation of Privilege Vulnerability
MicrosoftPower BI CVE-2024-30054 Microsoft Power BI Client JavaScript SDK Information Disclosure Vulnerability
MicrosoftVisual Studio CVE-2024-30046 Visual Studio Denial of Service Vulnerability
GithubVisual Studio CVE-2024-32004 GitHub: CVE-2024-32004 Remote Code Execution while cloning special-crafted local repositories
GithubVisual Studio CVE-2024-32002 CVE-2024-32002 Recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution
MicrosoftWindows Cloud Files Mini Filter Driver CVE-2024-30034 Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
MicrosoftWindows CNG Key Isolation Service CVE-2024-30031 Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2024-29996 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2024-30037 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2024-30025 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Cryptographic Services CVE-2024-30020 Windows Cryptographic Services Remote Code Execution Vulnerability
MicrosoftWindows Cryptographic Services CVE-2024-30016 Windows Cryptographic Services Information Disclosure Vulnerability
MicrosoftWindows Deployment Services CVE-2024-30036 Windows Deployment Services Information Disclosure Vulnerability
MicrosoftWindows DHCP Server CVE-2024-30019 DHCP Server Service Denial of Service Vulnerability
MicrosoftWindows DWM Core Library CVE-2024-30008 Windows DWM Core Library Information Disclosure Vulnerability
MicrosoftWindows DWM Core Library CVE-2024-30051 Windows DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows DWM Core Library CVE-2024-30035 Windows DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows DWM Core Library CVE-2024-30032 Windows DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows Hyper-V CVE-2024-30011 Windows Hyper-V Denial of Service Vulnerability
MicrosoftWindows Hyper-V CVE-2024-30017 Windows Hyper-V Remote Code Execution Vulnerability
MicrosoftWindows Hyper-V CVE-2024-30010 Windows Hyper-V Remote Code Execution Vulnerability
MicrosoftWindows Kernel CVE-2024-30018 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Mark of the Web (MOTW) CVE-2024-30050 Windows Mark of the Web Security Feature Bypass Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30002 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-29997 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30003 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30012 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-29999 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-29998 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30000 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30005 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30004 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30021 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-30001 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows MSHTML Platform CVE-2024-30040 Windows MSHTML Platform Security Feature Bypass Vulnerability
MicrosoftWindows NTFS CVE-2024-30027 NTFS Elevation of Privilege Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-30039 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30009 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30024 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30015 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30029 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30023 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30014 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-30022 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Task Scheduler CVE-2024-26238 Microsoft PLUGScheduler Scheduled Task Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - GRFX CVE-2024-30030 Win32k Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - ICOMP CVE-2024-30038 Win32k Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - ICOMP CVE-2024-30049 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
MicrosoftWindows Win32K - ICOMP CVE-2024-30028 Win32k Elevation of Privilege Vulnerability

CVE-2024-32002 - CVE-2024-32002 Recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-32002
MITRE
NVD

Issuing CNA: Github

CVE Title: CVE-2024-32002 Recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code Execution
CVSS:

CVSS:3.1 Highest BaseScore:9.0/TemporalScore:7.8
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why is this GitHub CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in MinGit software which is consumed by Microsoft Visual Studio. It is being documented in the Security Update Guide to announce that the latest builds of Visual Studio are no longer vulnerable. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-32002
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8) Release Notes (Security Update) Important Remote Code Execution None Base: 9.0
Temporal: 7.8
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
15.9.62 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-32002 Anonymous


CVE-2024-29996 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29996
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29996
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Elevation of Privilege 5036925 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege 5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Elevation of Privilege
5036892
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Elevation of Privilege 5036894
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege 5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Elevation of Privilege
5036893
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Elevation of Privilege 5036932
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Elevation of Privilege 5036967
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Elevation of Privilege 5036969 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Elevation of Privilege 5036960 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Elevation of Privilege 5036899 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Elevation of Privilege 5036896 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5036909
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29996 Seunghoe Kim and Daejin Lee of S2W Inc.


CVE-2024-29997 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29997
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29997
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29997 B1aN


CVE-2024-29998 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29998
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29998
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29998 B1aN


CVE-2024-29999 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29999
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29999
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29999 B1aN


CVE-2024-30000 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30000
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30000
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30000 B1aN


CVE-2024-30001 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30001
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30001
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30001 B1aN


CVE-2024-30002 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30002
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30002
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30002 B1aN


CVE-2024-30003 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30003
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30003
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30003 B1aN


CVE-2024-30004 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30004
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30004
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30004 B1aN


CVE-2024-30005 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30005
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30005
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30005 B1aN


CVE-2024-30006 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30006
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30006
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30006 Anonymous


CVE-2024-30007 - Microsoft Brokering File System Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30007
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could potentially gain the ability to authenticate against a remote host using the current user’s credentials.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by taking advantage of a security oversight in the driver’s management of network path validations, which could circumvent the established security protocols designed to safeguard user credentials during application interactions with remote hosts. This could potentially grant unauthorized access to network resources and facilitate the execution of unauthorized actions under the assumed identity of a legitimate user.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30007
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Elevation of Privilege 5036910 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30007 Naceri with MSRC Vulnerabilities & Mitigations


CVE-2024-30008 - Windows DWM Core Library Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30008
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DWM Core Library Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could view heap memory from a privileged process running on the server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30008
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Information Disclosure 5036925 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Information Disclosure 5036925 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Information Disclosure 5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Information Disclosure
5036892
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Information Disclosure 5036894
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Information Disclosure 5036894
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Information Disclosure 5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Information Disclosure 5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Information Disclosure
5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Information Disclosure
5036893
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2016 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Information Disclosure 5036899 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Information Disclosure 5036896 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Information Disclosure 5036909
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Information Disclosure 5036909
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Information Disclosure 5036910 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30008 Zhang WangJunJie, He YiSheng with Hillstone Network Security Research Institute


CVE-2024-30009 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30009
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30009
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30009 Anonymous


CVE-2024-30010 - Windows Hyper-V Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30010
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

The attacker must be authenticated to be able to exploit this vulnerability.


How would an attacker exploit this vulnerability?

An attacker who successfully exploited this vulnerability could send malformed packets to Hyper-V Replica endpoints on the host from a remote machine.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30010
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30010 ziming zhang with Ant Security Light-Year Lab


CVE-2024-30011 - Windows Hyper-V Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30011
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30011
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5037778 (Monthly Rollup) Important Denial of Service 5036969 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Denial of Service 5036969 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Denial of Service 5036960 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Denial of Service 5036960 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Denial of Service 5036899 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Denial of Service 5036899 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Denial of Service 5036896 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Denial of Service 5036896 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Denial of Service 5036909
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Denial of Service 5036909
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Denial of Service 5036910 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30011 ziming zhang with Ant Security Light-Year Lab


CVE-2024-30012 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30012
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30012
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30012 B1aN


CVE-2024-30014 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30014
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelTemporary Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30014
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.14393.6981 Yes None
Windows Server 2019 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.17763.5820 Yes None
Windows Server 2019 (Server Core installation) 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.17763.5820 Yes None
Windows Server 2022 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022 (Server Core installation) 5037782 (Security Update)
5037848 (SecurityHotpatchUpdate)
Important Remote Code Execution 5036909
Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.20348.2461

10.0.20348.2458
Yes 5037782
Windows Server 2022, 23H2 Edition (Server Core installation) 5037781 (Security Update) Important Remote Code Execution 5036910 Base: 7.5
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:T/RC:C
10.0.25398.887 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-30014 Anonymous


QingHe Xie and FangMing Gu


CVE-2024-30015 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-30015
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    14-May-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-30015
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 for x64-based Systems 5037788 (Security Update) Important Remote Code Execution 5036925 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20651 Yes None
Windows 10 Version 1607 for 32-bit Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1607 for x64-based Systems 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows 10 Version 1809 for 32-bit Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 1809 for x64-based Systems 5037765 (Security Update) Important Remote Code Execution 5036896 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5820 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 21H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution 5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4412
Yes 5037768
Windows 10 Version 22H2 for 32-bit Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for ARM64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 10 Version 22H2 for x64-based Systems 5037768 (Security Update) Important Remote Code Execution
5036892
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4412
Yes 5037768
Windows 11 version 21H2 for ARM64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 version 21H2 for x64-based Systems 5037770 (Security Update) Important Remote Code Execution 5036894
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2960
Yes 5037770
Windows 11 Version 22H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 22H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution 5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3593
Yes 5037771
Windows 11 Version 23H2 for ARM64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows 11 Version 23H2 for x64-based Systems 5037771 (Security Update) Important Remote Code Execution
5036893
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3593
Yes 5037771
Windows Server 2008 for 32-bit Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037800 (Monthly Rollup)
5037836 (Security Only)
Important Remote Code Execution 5036932
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22668
Yes 5037800
5037836
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037780 (Monthly Rollup)
5037803 (Security Only)
Important Remote Code Execution 5036967
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27117 Yes None
Windows Server 2012 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 (Server Core installation) 5037778 (Monthly Rollup) Important Remote Code Execution 5036969 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24868 Yes None
Windows Server 2012 R2 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2012 R2 (Server Core installation) 5037823 (Monthly Rollup) Important Remote Code Execution 5036960 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21972 Yes None
Windows Server 2016 5037763 (Security Update) Important Remote Code Execution 5036899 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6981 Yes None
Windows Server 2016 (Server Core installation) 5037763 (Security Update) Important Remote Code Executi