This report contains detail for the following vulnerabilities:
CVE Issued by | Tag | CVE ID | CVE Title |
---|---|---|---|
Microsoft | .NET | CVE-2024-21386 | .NET Denial of Service Vulnerability |
Microsoft | .NET | CVE-2024-21404 | .NET Denial of Service Vulnerability |
Microsoft | Azure Active Directory | CVE-2024-21401 | Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability |
Microsoft | Azure Active Directory | CVE-2024-21381 | Microsoft Azure Active Directory B2C Spoofing Vulnerability |
Microsoft | Azure Connected Machine Agent | CVE-2024-21329 | Azure Connected Machine Agent Elevation of Privilege Vulnerability |
Microsoft | Azure DevOps | CVE-2024-20667 | Azure DevOps Server Remote Code Execution Vulnerability |
Microsoft | Azure File Sync | CVE-2024-21397 | Microsoft Azure File Sync Elevation of Privilege Vulnerability |
Microsoft | Azure Site Recovery | CVE-2024-21364 | Microsoft Azure Site Recovery Elevation of Privilege Vulnerability |
Microsoft | Azure Stack | CVE-2024-20679 | Azure Stack Hub Spoofing Vulnerability |
Microsoft | Internet Shortcut Files | CVE-2024-21412 | Internet Shortcut Files Security Feature Bypass Vulnerability |
security-advisories@github.com | Mariner | CVE-2024-21626 | Unknown |
Microsoft | Microsoft ActiveX | CVE-2024-21349 | Microsoft ActiveX Data Objects Remote Code Execution Vulnerability |
Microsoft | Microsoft Azure Kubernetes Service | CVE-2024-21403 | Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability |
Microsoft | Microsoft Azure Kubernetes Service | CVE-2024-21376 | Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability |
Microsoft | Microsoft Defender for Endpoint | CVE-2024-21315 | Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability |
Microsoft | Microsoft Dynamics | CVE-2024-21393 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
Microsoft | Microsoft Dynamics | CVE-2024-21389 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
Microsoft | Microsoft Dynamics | CVE-2024-21395 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
Microsoft | Microsoft Dynamics | CVE-2024-21380 | Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability |
Microsoft | Microsoft Dynamics | CVE-2024-21328 | Dynamics 365 Sales Spoofing Vulnerability |
Microsoft | Microsoft Dynamics | CVE-2024-21394 | Dynamics 365 Field Service Spoofing Vulnerability |
Microsoft | Microsoft Dynamics | CVE-2024-21396 | Dynamics 365 Sales Spoofing Vulnerability |
Microsoft | Microsoft Dynamics | CVE-2024-21327 | Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-1284 | Chromium: CVE-2024-1284 Use after free in Mojo |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2024-21399 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-1060 | Chromium: CVE-2024-1060 Use after free in Canvas |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-1077 | Chromium: CVE-2024-1077 Use after free in Network |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-1283 | Chromium: CVE-2024-1283 Heap buffer overflow in Skia |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-1059 | Chromium: CVE-2024-1059 Use after free in WebRTC |
Microsoft | Microsoft Exchange Server | CVE-2024-21410 | Microsoft Exchange Server Elevation of Privilege Vulnerability |
Microsoft | Microsoft Office | CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability |
Microsoft | Microsoft Office | CVE-2024-20673 | Microsoft Office Remote Code Execution Vulnerability |
Microsoft | Microsoft Office OneNote | CVE-2024-21384 | Microsoft Office OneNote Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Outlook | CVE-2024-21378 | Microsoft Outlook Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Outlook | CVE-2024-21402 | Microsoft Outlook Elevation of Privilege Vulnerability |
Microsoft | Microsoft Office Word | CVE-2024-21379 | Microsoft Word Remote Code Execution Vulnerability |
Microsoft | Microsoft Teams for Android | CVE-2024-21374 | Microsoft Teams for Android Information Disclosure |
Microsoft | Microsoft WDAC ODBC Driver | CVE-2024-21353 | Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21370 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21350 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21368 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21359 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21365 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21367 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21420 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21366 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21369 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21375 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21361 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21358 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21391 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21360 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-21352 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft Windows | CVE-2024-21406 | Windows Printing Service Spoofing Vulnerability |
Microsoft | Microsoft Windows DNS | CVE-2024-21377 | Windows DNS Information Disclosure Vulnerability |
MITRE | Role: DNS Server | CVE-2023-50387 | MITRE: CVE-2023-50387 DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers |
Microsoft | Role: DNS Server | CVE-2024-21342 | Windows DNS Client Denial of Service Vulnerability |
Microsoft | Skype for Business | CVE-2024-20695 | Skype for Business Information Disclosure Vulnerability |
Microsoft | SQL Server | CVE-2024-21347 | Microsoft ODBC Driver Remote Code Execution Vulnerability |
Microsoft | Trusted Compute Base | CVE-2024-21304 | Trusted Compute Base Elevation of Privilege Vulnerability |
Microsoft | Windows Hyper-V | CVE-2024-20684 | Windows Hyper-V Denial of Service Vulnerability |
Microsoft | Windows Internet Connection Sharing (ICS) | CVE-2024-21343 | Windows Network Address Translation (NAT) Denial of Service Vulnerability |
Microsoft | Windows Internet Connection Sharing (ICS) | CVE-2024-21348 | Internet Connection Sharing (ICS) Denial of Service Vulnerability |
Microsoft | Windows Internet Connection Sharing (ICS) | CVE-2024-21357 | Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability |
Microsoft | Windows Internet Connection Sharing (ICS) | CVE-2024-21344 | Windows Network Address Translation (NAT) Denial of Service Vulnerability |
Microsoft | Windows Kernel | CVE-2024-21371 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2024-21338 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2024-21341 | Windows Kernel Remote Code Execution Vulnerability |
Microsoft | Windows Kernel | CVE-2024-21345 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2024-21362 | Windows Kernel Security Feature Bypass Vulnerability |
Microsoft | Windows Kernel | CVE-2024-21340 | Windows Kernel Information Disclosure Vulnerability |
Microsoft | Windows LDAP - Lightweight Directory Access Protocol | CVE-2024-21356 | Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability |
Microsoft | Windows Message Queuing | CVE-2024-21363 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
Microsoft | Windows Message Queuing | CVE-2024-21355 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability |
Microsoft | Windows Message Queuing | CVE-2024-21405 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability |
Microsoft | Windows Message Queuing | CVE-2024-21354 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability |
Microsoft | Windows OLE | CVE-2024-21372 | Windows OLE Remote Code Execution Vulnerability |
Microsoft | Windows SmartScreen | CVE-2024-21351 | Windows SmartScreen Security Feature Bypass Vulnerability |
Microsoft | Windows USB Serial Driver | CVE-2024-21339 | Windows USB Generic Parent Driver Remote Code Execution Vulnerability |
Microsoft | Windows Win32K - ICOMP | CVE-2024-21346 | Win32k Elevation of Privilege Vulnerability |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||
CVE-2024-1283
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-1283 Heap buffer overflow in Skia
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    08-Feb-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-1283 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
121.0.2277.113 | No | None |
Microsoft Edge (Chromium-based) Extended Stable | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
120.0.2210.175 | No | None |
CVE ID | Acknowledgements |
CVE-2024-1283 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||
CVE-2024-1284
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-1284 Use after free in Mojo
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    08-Feb-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-1284 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
121.0.2277.113 | No | None |
Microsoft Edge (Chromium-based) Extended Stable | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
120.0.2210.175 | No | None |
CVE ID | Acknowledgements |
CVE-2024-1284 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-20667
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure DevOps Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N), attack complexity is high (AC:H), and privilege required is low (PR:L). What is the target used in the context of the remote code execution? Successful exploitation of this vulnerability requires the attacker to have Queue Build permissions and for the target Azure DevOps pipeline to meet certain conditions for an attacker to exploit this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-20667 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure DevOps Server 2019.1.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
20240126.6 | Maybe | None |
Azure DevOps Server 2020.1.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
20240126.2 | Maybe | None |
Azure DevOps Server 2022.1 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
20240126.4 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-20667 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2023-50387
MITRE NVD Issuing CNA: MITRE |
CVE Title: MITRE: CVE-2023-50387 DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-50387 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Denial of Service | 5034169 |
Base: N/A Temporal: N/A Vector: N/A |
6.1.7601.26961 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Denial of Service | 5034169 |
Base: N/A Temporal: N/A Vector: N/A |
6.1.7601.26961 | Yes | None |
Windows Server 2012 | 5034830 (Monthly Rollup) | Important | Denial of Service | 5034184 | Base: N/A Temporal: N/A Vector: N/A |
6.2.9200.24710 | Yes | None |
Windows Server 2012 (Server Core installation) | 5034830 (Monthly Rollup) | Important | Denial of Service | 5034184 | Base: N/A Temporal: N/A Vector: N/A |
6.2.9200.24710 | Yes | None |
Windows Server 2012 R2 | 5034819 (Monthly Rollup) | Important | Denial of Service | 5034171 | Base: N/A Temporal: N/A Vector: N/A |
6.3.9600.21813 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5034819 (Monthly Rollup) | Important | Denial of Service | 5034171 | Base: N/A Temporal: N/A Vector: N/A |
6.3.9600.21813 | Yes | None |
Windows Server 2016 | 5034767 (Security Update) | Important | Denial of Service | 5034119 | Base: N/A Temporal: N/A Vector: N/A |
10.0.14393.6709 | Yes | None |
Windows Server 2016 (Server Core installation) | 5034767 (Security Update) | Important | Denial of Service | 5034119 | Base: N/A Temporal: N/A Vector: N/A |
10.0.14393.6709 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Important | Denial of Service | 5034127 | Base: N/A Temporal: N/A Vector: N/A |
10.0.17763.5458 | Yes | None |
Windows Server 2019 (Server Core installation) | 5034768 (Security Update) | Important | Denial of Service | 5034127 | Base: N/A Temporal: N/A Vector: N/A |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Important | Denial of Service | 5034129 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022 (Server Core installation) | 5034770 (Security Update) | Important | Denial of Service | 5034129 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5034769 (Security Update) | Important | Denial of Service | 5034130 | Base: N/A Temporal: N/A Vector: N/A |
10.0.25398.709 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-50387 | Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner from the German National Research Center for Applied Cybersecurity ATHENE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21327
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Executive Summary: None FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to navigate to a page with malicious content to be compromised by the attacker. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21327 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Dynamics 365 Customer Engagement V9.1 | 5035110 (Security Update) | Important | Spoofing | None | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C |
TBD | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-21327 | Dhiral Patel |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21329
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? A non-admin local user who has sufficient permissions to create symbolic links on a Windows computer that has Azure Connected Machine Agent installed (or before the agent is installed) could create links from a directory used by the agent to other privileged files on the computer. If the administrator later installs virtual machine extensions on the machine, those files could be deleted. What privileges could an attacker gain with successful exploitation? An attacker who successfully exploited the vulnerability could add symlinks and cause an arbitrary file delete as SYSTEM. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21329 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Connected Machine Agent | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.38 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-21329 | R4nger & Zhiniang Peng |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21338
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21338 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5034768 (Security Update) | Important | Elevation of Privilege | 5034127 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5034768 (Security Update) | Important | Elevation of Privilege | 5034127 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5034768 (Security Update) | Important | Elevation of Privilege | 5034127 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5034763 (Security Update) | Important | Elevation of Privilege | 5034122 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Elevation of Privilege | 5034122 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for x64-based Systems | 5034763 (Security Update) | Important | Elevation of Privilege | 5034122 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for 32-bit Systems | 5034763 (Security Update) | Important | Elevation of Privilege | 5034122 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Elevation of Privilege | 5034122 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for x64-based Systems | 5034763 (Security Update) | Important | Elevation of Privilege | 5034122 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 11 version 21H2 for ARM64-based Systems | 5034766 (Security Update) | Important | Elevation of Privilege | 5034121 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5034766 (Security Update) | Important | Elevation of Privilege | 5034121 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Elevation of Privilege | 5034123 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5034765 (Security Update) | Important | Elevation of Privilege | 5034123 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Elevation of Privilege | 5034123 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5034765 (Security Update) | Important | Elevation of Privilege | 5034123 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Important | Elevation of Privilege | 5034127 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2019 (Server Core installation) | 5034768 (Security Update) | Important | Elevation of Privilege | 5034127 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Important | Elevation of Privilege | 5034129 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022 (Server Core installation) | 5034770 (Security Update) | Important | Elevation of Privilege | 5034129 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5034769 (Security Update) | Important | Elevation of Privilege | 5034130 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.709 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21338 | Jan Vojtěšek with Avast |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21340
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.6/TemporalScore:4.0
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21340 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5034774 (Security Update) | Important | Information Disclosure | 5034134 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 for x64-based Systems | 5034774 (Security Update) | Important | Information Disclosure | 5034134 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5034767 (Security Update) | Important | Information Disclosure | 5034119 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5034767 (Security Update) | Important | Information Disclosure | 5034119 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5034768 (Security Update) | Important | Information Disclosure | 5034127 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5034768 (Security Update) | Important | Information Disclosure | 5034127 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5034768 (Security Update) | Important | Information Disclosure | 5034127 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5034763 (Security Update) | Important | Information Disclosure | 5034122 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Information Disclosure | 5034122 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for x64-based Systems | 5034763 (Security Update) | Important | Information Disclosure | 5034122 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for 32-bit Systems | 5034763 (Security Update) | Important | Information Disclosure | 5034122 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Information Disclosure | 5034122 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for x64-based Systems | 5034763 (Security Update) | Important | Information Disclosure | 5034122 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 11 version 21H2 for ARM64-based Systems | 5034766 (Security Update) | Important | Information Disclosure | 5034121 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5034766 (Security Update) | Important | Information Disclosure | 5034121 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Information Disclosure | 5034123 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5034765 (Security Update) | Important | Information Disclosure | 5034123 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Information Disclosure | 5034123 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5034765 (Security Update) | Important | Information Disclosure | 5034123 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Information Disclosure | 5034173 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Information Disclosure | 5034173 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Information Disclosure | 5034173 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Information Disclosure | 5034173 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Information Disclosure | 5034169 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Information Disclosure | 5034169 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2012 | 5034830 (Monthly Rollup) | Important | Information Disclosure | 5034184 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 (Server Core installation) | 5034830 (Monthly Rollup) | Important | Information Disclosure | 5034184 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 R2 | 5034819 (Monthly Rollup) | Important | Information Disclosure | 5034171 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5034819 (Monthly Rollup) | Important | Information Disclosure | 5034171 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2016 | 5034767 (Security Update) | Important | Information Disclosure | 5034119 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2016 (Server Core installation) | 5034767 (Security Update) | Important | Information Disclosure | 5034119 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Important | Information Disclosure | 5034127 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2019 (Server Core installation) | 5034768 (Security Update) | Important | Information Disclosure | 5034127 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Important | Information Disclosure | 5034129 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022 (Server Core installation) | 5034770 (Security Update) | Important | Information Disclosure | 5034129 |
Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5034769 (Security Update) | Important | Information Disclosure | 5034130 | Base: 4.6 Temporal: 4.0 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.709 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21340 | Wei in Kunlun Lab with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21349
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. How could an attacker exploit this vulnerability? An attacker would need to set up a malicious server and create a proof-of-concept script. The victim would then need to be convinced, possibly through social engineering techniques, to run this script, which would connect to the malicious server and potentially allow for remote code execution on the victim’s machine. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21349 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 for x64-based Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 11 version 21H2 for ARM64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2012 | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 (Server Core installation) | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 R2 | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2016 | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2016 (Server Core installation) | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2019 (Server Core installation) | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022 (Server Core installation) | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5034769 (Security Update) | Important | Remote Code Execution | 5034130 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.709 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21349 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21350
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21350 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 for x64-based Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 11 version 21H2 for ARM64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2012 | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 (Server Core installation) | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 R2 | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2016 | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2016 (Server Core installation) | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2019 (Server Core installation) | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022 (Server Core installation) | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5034769 (Security Update) | Important | Remote Code Execution | 5034130 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.709 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21350 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21351
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows SmartScreen Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Executive Summary: None FAQ: What is the relationship between Mark of the Web and Windows SmartScreen? When you download a file from the internet, Windows adds the zone identifier or Mark of the Web as an NTFS stream to the file. So, when you run the file, Windows SmartScreen checks if there is a zone identifier Alternate Data Stream (ADS) attached to the file. If the ADS indicates ZoneId=3 which means that the file was downloaded from the internet, the SmartScreen does a reputation check. For more information on SmartScreen, please visit Microsoft Defender SmartScreen overview | Microsoft Learn. According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability? An authorized attacker must send the user a malicious file and convince the user to open it. What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass the SmartScreen user experience. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L), a total loss of integrity (I:H), and some loss of availability (A:L). What does that mean for this vulnerability? The vulnerability allows a malicious actor to inject code into SmartScreen and potentially gain code execution, which could potentially lead to some data exposure, lack of system availability, or both. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Moderate | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2024-21351 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5034774 (Security Update) | Moderate | Security Feature Bypass | 5034134 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 for x64-based Systems | 5034774 (Security Update) | Moderate | Security Feature Bypass | 5034134 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5034767 (Security Update) | Moderate | Security Feature Bypass | 5034119 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5034767 (Security Update) | Moderate | Security Feature Bypass | 5034119 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5034768 (Security Update) | Moderate | Security Feature Bypass | 5034127 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5034768 (Security Update) | Moderate | Security Feature Bypass | 5034127 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5034768 (Security Update) | Moderate | Security Feature Bypass | 5034127 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5034763 (Security Update) | Moderate | Security Feature Bypass | 5034122 |
Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for ARM64-based Systems | 5034763 (Security Update) | Moderate | Security Feature Bypass | 5034122 |
Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for x64-based Systems | 5034763 (Security Update) | Moderate | Security Feature Bypass | 5034122 |
Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for 32-bit Systems | 5034763 (Security Update) | Moderate | Security Feature Bypass | 5034122 |
Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for ARM64-based Systems | 5034763 (Security Update) | Moderate | Security Feature Bypass | 5034122 |
Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for x64-based Systems | 5034763 (Security Update) | Moderate | Security Feature Bypass | 5034122 |
Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 11 version 21H2 for ARM64-based Systems | 5034766 (Security Update) | Moderate | Security Feature Bypass | 5034121 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5034766 (Security Update) | Moderate | Security Feature Bypass | 5034121 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5034765 (Security Update) | Moderate | Security Feature Bypass | 5034123 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5034765 (Security Update) | Moderate | Security Feature Bypass | 5034123 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5034765 (Security Update) | Moderate | Security Feature Bypass | 5034123 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5034765 (Security Update) | Moderate | Security Feature Bypass | 5034123 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows Server 2016 | 5034767 (Security Update) | Moderate | Security Feature Bypass | 5034119 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Moderate | Security Feature Bypass | 5034127 | Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Moderate | Security Feature Bypass | 5034129 |
Base: 7.6 Temporal: 6.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
CVE ID | Acknowledgements |
CVE-2024-21351 | Eric Lawrence with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21352
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21352 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 for x64-based Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 11 version 21H2 for ARM64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2012 | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 (Server Core installation) | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 R2 | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2016 | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2016 (Server Core installation) | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2019 (Server Core installation) | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022 (Server Core installation) | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5034769 (Security Update) | Important | Remote Code Execution | 5034130 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.709 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21352 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21354
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21354 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5034774 (Security Update) | Important | Elevation of Privilege | 5034134 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 for x64-based Systems | 5034774 (Security Update) | Important | Elevation of Privilege | 5034134 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5034767 (Security Update) | Important | Elevation of Privilege | 5034119 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5034767 (Security Update) | Important | Elevation of Privilege | 5034119 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5034768 (Security Update) | Important | Elevation of Privilege | 5034127 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5034768 (Security Update) | Important | Elevation of Privilege | 5034127 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5034768 (Security Update) | Important | Elevation of Privilege | 5034127 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5034763 (Security Update) | Important | Elevation of Privilege | 5034122 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Elevation of Privilege | 5034122 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for x64-based Systems | 5034763 (Security Update) | Important | Elevation of Privilege | 5034122 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for 32-bit Systems | 5034763 (Security Update) | Important | Elevation of Privilege | 5034122 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Elevation of Privilege | 5034122 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for x64-based Systems | 5034763 (Security Update) | Important | Elevation of Privilege | 5034122 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 11 version 21H2 for ARM64-based Systems | 5034766 (Security Update) | Important | Elevation of Privilege | 5034121 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5034766 (Security Update) | Important | Elevation of Privilege | 5034121 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Elevation of Privilege | 5034123 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5034765 (Security Update) | Important | Elevation of Privilege | 5034123 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Elevation of Privilege | 5034123 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5034765 (Security Update) | Important | Elevation of Privilege | 5034123 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Elevation of Privilege | 5034173 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Elevation of Privilege | 5034173 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Elevation of Privilege | 5034173 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Elevation of Privilege | 5034173 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Elevation of Privilege | 5034169 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Elevation of Privilege | 5034169 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2012 | 5034830 (Monthly Rollup) | Important | Elevation of Privilege | 5034184 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 (Server Core installation) | 5034830 (Monthly Rollup) | Important | Elevation of Privilege | 5034184 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 R2 | 5034819 (Monthly Rollup) | Important | Elevation of Privilege | 5034171 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5034819 (Monthly Rollup) | Important | Elevation of Privilege | 5034171 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2016 | 5034767 (Security Update) | Important | Elevation of Privilege | 5034119 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2016 (Server Core installation) | 5034767 (Security Update) | Important | Elevation of Privilege | 5034119 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Important | Elevation of Privilege | 5034127 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2019 (Server Core installation) | 5034768 (Security Update) | Important | Elevation of Privilege | 5034127 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Important | Elevation of Privilege | 5034129 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022 (Server Core installation) | 5034770 (Security Update) | Important | Elevation of Privilege | 5034129 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5034769 (Security Update) | Important | Elevation of Privilege | 5034130 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.709 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21354 | Yuki Chen with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21357
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability? This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21357 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5034774 (Security Update) | Critical | Remote Code Execution | 5034134 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 for x64-based Systems | 5034774 (Security Update) | Critical | Remote Code Execution | 5034134 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5034767 (Security Update) | Critical | Remote Code Execution | 5034119 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5034767 (Security Update) | Critical | Remote Code Execution | 5034119 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5034768 (Security Update) | Critical | Remote Code Execution | 5034127 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5034768 (Security Update) | Critical | Remote Code Execution | 5034127 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5034768 (Security Update) | Critical | Remote Code Execution | 5034127 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5034763 (Security Update) | Critical | Remote Code Execution | 5034122 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for ARM64-based Systems | 5034763 (Security Update) | Critical | Remote Code Execution | 5034122 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for x64-based Systems | 5034763 (Security Update) | Critical | Remote Code Execution | 5034122 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for 32-bit Systems | 5034763 (Security Update) | Critical | Remote Code Execution | 5034122 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for ARM64-based Systems | 5034763 (Security Update) | Critical | Remote Code Execution | 5034122 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for x64-based Systems | 5034763 (Security Update) | Critical | Remote Code Execution | 5034122 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 11 version 21H2 for ARM64-based Systems | 5034766 (Security Update) | Critical | Remote Code Execution | 5034121 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5034766 (Security Update) | Critical | Remote Code Execution | 5034121 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5034765 (Security Update) | Critical | Remote Code Execution | 5034123 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5034765 (Security Update) | Critical | Remote Code Execution | 5034123 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5034765 (Security Update) | Critical | Remote Code Execution | 5034123 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5034765 (Security Update) | Critical | Remote Code Execution | 5034123 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Critical | Remote Code Execution | 5034173 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Critical | Remote Code Execution | 5034173 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Critical | Remote Code Execution | 5034173 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Critical | Remote Code Execution | 5034173 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Critical | Remote Code Execution | 5034169 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Critical | Remote Code Execution | 5034169 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2012 | 5034830 (Monthly Rollup) | Critical | Remote Code Execution | 5034184 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 (Server Core installation) | 5034830 (Monthly Rollup) | Critical | Remote Code Execution | 5034184 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 R2 | 5034819 (Monthly Rollup) | Critical | Remote Code Execution | 5034171 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5034819 (Monthly Rollup) | Critical | Remote Code Execution | 5034171 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2016 | 5034767 (Security Update) | Critical | Remote Code Execution | 5034119 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2016 (Server Core installation) | 5034767 (Security Update) | Critical | Remote Code Execution | 5034119 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Critical | Remote Code Execution | 5034127 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2019 (Server Core installation) | 5034768 (Security Update) | Critical | Remote Code Execution | 5034127 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Critical | Remote Code Execution | 5034129 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022 (Server Core installation) | 5034770 (Security Update) | Critical | Remote Code Execution | 5034129 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5034769 (Security Update) | Critical | Remote Code Execution | 5034130 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.709 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21357 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21358
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21358 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 for x64-based Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 11 version 21H2 for ARM64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2012 | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 (Server Core installation) | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 R2 | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2016 | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2016 (Server Core installation) | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2019 (Server Core installation) | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022 (Server Core installation) | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5034769 (Security Update) | Important | Remote Code Execution | 5034130 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.709 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21358 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21360
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21360 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 for x64-based Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 11 version 21H2 for ARM64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2012 | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 (Server Core installation) | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 R2 | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2016 | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2016 (Server Core installation) | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2019 (Server Core installation) | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022 (Server Core installation) | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5034769 (Security Update) | Important | Remote Code Execution | 5034130 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.709 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21360 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21361
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21361 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 for x64-based Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 11 version 21H2 for ARM64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2012 | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 (Server Core installation) | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 R2 | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2016 | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2016 (Server Core installation) | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2019 (Server Core installation) | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022 (Server Core installation) | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5034769 (Security Update) | Important | Remote Code Execution | 5034130 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.709 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21361 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21366
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21366 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 for x64-based Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 11 version 21H2 for ARM64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2012 | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 (Server Core installation) | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 R2 | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2016 | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2016 (Server Core installation) | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2019 (Server Core installation) | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022 (Server Core installation) | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5034769 (Security Update) | Important | Remote Code Execution | 5034130 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.709 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21366 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21369
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21369 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 for x64-based Systems | 5034774 (Security Update) | Important | Remote Code Execution | 5034134 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 21H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for 32-bit Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for ARM64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 10 Version 22H2 for x64-based Systems | 5034763 (Security Update) | Important | Remote Code Execution | 5034122 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4046 |
Yes | 5034763 |
Windows 11 version 21H2 for ARM64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5034766 (Security Update) | Important | Remote Code Execution | 5034121 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2777 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3155 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5034765 (Security Update) | Important | Remote Code Execution | 5034123 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3155 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5034795 (Monthly Rollup) 5034833 (Security Only) |
Important | Remote Code Execution | 5034173 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22511 |
Yes | 5034795 5034833 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5034831 (Monthly Rollup) 5034809 (Security Only) |
Important | Remote Code Execution | 5034169 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.26961 | Yes | None |
Windows Server 2012 | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 (Server Core installation) | 5034830 (Monthly Rollup) | Important | Remote Code Execution | 5034184 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24710 | Yes | None |
Windows Server 2012 R2 | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5034819 (Monthly Rollup) | Important | Remote Code Execution | 5034171 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21813 | Yes | None |
Windows Server 2016 | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2016 (Server Core installation) | 5034767 (Security Update) | Important | Remote Code Execution | 5034119 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6709 | Yes | None |
Windows Server 2019 | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2019 (Server Core installation) | 5034768 (Security Update) | Important | Remote Code Execution | 5034127 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5458 | Yes | None |
Windows Server 2022 | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022 (Server Core installation) | 5034770 (Security Update) | Important | Remote Code Execution | 5034129 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2322 |
Yes | 5034770 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5034769 (Security Update) | Important | Remote Code Execution | 5034130 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.709 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21369 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21371
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Feb-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21371 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5034774 (Security Update) | Important | Elevation of Privilege | 5034134 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20469 | Yes | None |
Windows 10 for x64-based Systems | 5034774 (Security Update) | Important | Elevation |