Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
Microsoft.NET CVE-2024-21386 .NET Denial of Service Vulnerability
Microsoft.NET CVE-2024-21404 .NET Denial of Service Vulnerability
MicrosoftAzure Active Directory CVE-2024-21401 Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability
MicrosoftAzure Active Directory CVE-2024-21381 Microsoft Azure Active Directory B2C Spoofing Vulnerability
MicrosoftAzure Connected Machine Agent CVE-2024-21329 Azure Connected Machine Agent Elevation of Privilege Vulnerability
MicrosoftAzure DevOps CVE-2024-20667 Azure DevOps Server Remote Code Execution Vulnerability
MicrosoftAzure File Sync CVE-2024-21397 Microsoft Azure File Sync Elevation of Privilege Vulnerability
MicrosoftAzure Site Recovery CVE-2024-21364 Microsoft Azure Site Recovery Elevation of Privilege Vulnerability
MicrosoftAzure Stack CVE-2024-20679 Azure Stack Hub Spoofing Vulnerability
MicrosoftInternet Shortcut Files CVE-2024-21412 Internet Shortcut Files Security Feature Bypass Vulnerability
security-advisories@github.comMariner CVE-2024-21626 Unknown
MicrosoftMicrosoft ActiveX CVE-2024-21349 Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
MicrosoftMicrosoft Azure Kubernetes Service CVE-2024-21403 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
MicrosoftMicrosoft Azure Kubernetes Service CVE-2024-21376 Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability
MicrosoftMicrosoft Defender for Endpoint CVE-2024-21315 Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21393 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21389 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21395 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21380 Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21328 Dynamics 365 Sales Spoofing Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21394 Dynamics 365 Field Service Spoofing Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21396 Dynamics 365 Sales Spoofing Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21327 Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-1284 Chromium: CVE-2024-1284 Use after free in Mojo
MicrosoftMicrosoft Edge (Chromium-based) CVE-2024-21399 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-1060 Chromium: CVE-2024-1060 Use after free in Canvas
ChromeMicrosoft Edge (Chromium-based) CVE-2024-1077 Chromium: CVE-2024-1077 Use after free in Network
ChromeMicrosoft Edge (Chromium-based) CVE-2024-1283 Chromium: CVE-2024-1283 Heap buffer overflow in Skia
ChromeMicrosoft Edge (Chromium-based) CVE-2024-1059 Chromium: CVE-2024-1059 Use after free in WebRTC
MicrosoftMicrosoft Exchange Server CVE-2024-21410 Microsoft Exchange Server Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office CVE-2024-21413 Microsoft Outlook Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2024-20673 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office OneNote CVE-2024-21384 Microsoft Office OneNote Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Outlook CVE-2024-21378 Microsoft Outlook Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Outlook CVE-2024-21402 Microsoft Outlook Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office Word CVE-2024-21379 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Teams for Android CVE-2024-21374 Microsoft Teams for Android Information Disclosure
MicrosoftMicrosoft WDAC ODBC Driver CVE-2024-21353 Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21370 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21350 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21368 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21359 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21365 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21367 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21420 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21366 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21369 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21375 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21361 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21358 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21391 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21360 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21352 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Windows CVE-2024-21406 Windows Printing Service Spoofing Vulnerability
MicrosoftMicrosoft Windows DNS CVE-2024-21377 Windows DNS Information Disclosure Vulnerability
MITRERole: DNS Server CVE-2023-50387 MITRE: CVE-2023-50387 DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers
MicrosoftRole: DNS Server CVE-2024-21342 Windows DNS Client Denial of Service Vulnerability
MicrosoftSkype for Business CVE-2024-20695 Skype for Business Information Disclosure Vulnerability
MicrosoftSQL Server CVE-2024-21347 Microsoft ODBC Driver Remote Code Execution Vulnerability
MicrosoftTrusted Compute Base CVE-2024-21304 Trusted Compute Base Elevation of Privilege Vulnerability
MicrosoftWindows Hyper-V CVE-2024-20684 Windows Hyper-V Denial of Service Vulnerability
MicrosoftWindows Internet Connection Sharing (ICS) CVE-2024-21343 Windows Network Address Translation (NAT) Denial of Service Vulnerability
MicrosoftWindows Internet Connection Sharing (ICS) CVE-2024-21348 Internet Connection Sharing (ICS) Denial of Service Vulnerability
MicrosoftWindows Internet Connection Sharing (ICS) CVE-2024-21357 Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
MicrosoftWindows Internet Connection Sharing (ICS) CVE-2024-21344 Windows Network Address Translation (NAT) Denial of Service Vulnerability
MicrosoftWindows Kernel CVE-2024-21371 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-21338 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-21341 Windows Kernel Remote Code Execution Vulnerability
MicrosoftWindows Kernel CVE-2024-21345 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-21362 Windows Kernel Security Feature Bypass Vulnerability
MicrosoftWindows Kernel CVE-2024-21340 Windows Kernel Information Disclosure Vulnerability
MicrosoftWindows LDAP - Lightweight Directory Access Protocol CVE-2024-21356 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
MicrosoftWindows Message Queuing CVE-2024-21363 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2024-21355 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
MicrosoftWindows Message Queuing CVE-2024-21405 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
MicrosoftWindows Message Queuing CVE-2024-21354 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
MicrosoftWindows OLE CVE-2024-21372 Windows OLE Remote Code Execution Vulnerability
MicrosoftWindows SmartScreen CVE-2024-21351 Windows SmartScreen Security Feature Bypass Vulnerability
MicrosoftWindows USB Serial Driver CVE-2024-21339 Windows USB Generic Parent Driver Remote Code Execution Vulnerability
MicrosoftWindows Win32K - ICOMP CVE-2024-21346 Win32k Elevation of Privilege Vulnerability

CVE-2024-1283 - Chromium: CVE-2024-1283 Heap buffer overflow in Skia

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-1283
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-1283 Heap buffer overflow in Skia
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 121.0.2277.113 2/8/2024 121.0.6167.160/161
Extended Stable 120.0.2210.175 2/8/2024 120.0.6099.283

Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Feb-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-1283
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
121.0.2277.113 No None
Microsoft Edge (Chromium-based) Extended Stable Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
120.0.2210.175 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-1283 None

CVE-2024-1284 - Chromium: CVE-2024-1284 Use after free in Mojo

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-1284
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-1284 Use after free in Mojo
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 121.0.2277.113 2/8/2024 121.0.6167.160/161
Extended Stable 120.0.2210.175 2/8/2024 120.0.6099.283

Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Feb-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-1284
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
121.0.2277.113 No None
Microsoft Edge (Chromium-based) Extended Stable Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
120.0.2210.175 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-1284 None

CVE-2024-20667 - Azure DevOps Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20667
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure DevOps Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N), attack complexity is high (AC:H), and privilege required is low (PR:L). What is the target used in the context of the remote code execution?

Successful exploitation of this vulnerability requires the attacker to have Queue Build permissions and for the target Azure DevOps pipeline to meet certain conditions for an attacker to exploit this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20667
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure DevOps Server 2019.1.2 Release Notes (Security Update) Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
20240126.6 Maybe None
Azure DevOps Server 2020.1.2 Release Notes (Security Update) Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
20240126.2 Maybe None
Azure DevOps Server 2022.1 Release Notes (Security Update) Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
20240126.4 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20667 None

CVE-2023-50387 - MITRE: CVE-2023-50387 DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-50387
MITRE
NVD

Issuing CNA: MITRE

CVE Title: MITRE: CVE-2023-50387 DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-50387
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Denial of Service 5034169
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Denial of Service 5034169
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Denial of Service 5034184 Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Denial of Service 5034184 Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Denial of Service 5034171 Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Denial of Service 5034171 Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Denial of Service 5034119 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Denial of Service 5034119 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Denial of Service 5034127 Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Denial of Service 5034127 Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Denial of Service 5034129
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Denial of Service 5034129
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Denial of Service 5034130 Base: N/A
Temporal: N/A
Vector: N/A
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-50387 Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner from the German National Research Center for Applied Cybersecurity ATHENE


CVE-2024-21327 - Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21327
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to navigate to a page with malicious content to be compromised by the attacker.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21327
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 Customer Engagement V9.1 5035110 (Security Update) Important Spoofing None Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
TBD Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21327 Dhiral Patel


CVE-2024-21329 - Azure Connected Machine Agent Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21329
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

A non-admin local user who has sufficient permissions to create symbolic links on a Windows computer that has Azure Connected Machine Agent installed (or before the agent is installed) could create links from a directory used by the agent to other privileged files on the computer. If the administrator later installs virtual machine extensions on the machine, those files could be deleted.


What privileges could an attacker gain with successful exploitation?

An attacker who successfully exploited the vulnerability could add symlinks and cause an arbitrary file delete as SYSTEM.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21329
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Connected Machine Agent Release Notes (Security Update) Important Elevation of Privilege None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.38 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21329 R4nger & Zhiniang Peng


CVE-2024-21338 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21338
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21338
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2019 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Elevation of Privilege 5034130 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21338 Jan Vojtěšek with Avast


CVE-2024-21340 - Windows Kernel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21340
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.6/TemporalScore:4.0
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21340
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Information Disclosure 5034134 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Information Disclosure 5034134 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Information Disclosure 5034119 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Information Disclosure 5034119 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Information Disclosure 5034127 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Information Disclosure 5034127 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Information Disclosure 5034127 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Information Disclosure 5034122
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Information Disclosure 5034122
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Information Disclosure 5034122
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Information Disclosure
5034122
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Information Disclosure
5034122
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Information Disclosure
5034122
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Information Disclosure 5034121 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Information Disclosure 5034121 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Information Disclosure 5034123 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Information Disclosure 5034123 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Information Disclosure 5034123 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Information Disclosure 5034123 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Information Disclosure 5034173
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Information Disclosure 5034173
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Information Disclosure 5034173
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Information Disclosure 5034173
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Information Disclosure 5034169
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Information Disclosure 5034169
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Information Disclosure 5034184 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Information Disclosure 5034184 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Information Disclosure 5034171 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Information Disclosure 5034171 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Information Disclosure 5034119 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Information Disclosure 5034119 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Information Disclosure 5034127 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Information Disclosure 5034127 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Information Disclosure 5034129
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Information Disclosure 5034129
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Information Disclosure 5034130 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21340 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-21349 - Microsoft ActiveX Data Objects Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21349
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


How could an attacker exploit this vulnerability?

An attacker would need to set up a malicious server and create a proof-of-concept script. The victim would then need to be convinced, possibly through social engineering techniques, to run this script, which would connect to the malicious server and potentially allow for remote code execution on the victim’s machine.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21349
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21349 Anonymous


CVE-2024-21350 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21350
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21350
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21350 Anonymous


CVE-2024-21351 - Windows SmartScreen Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21351
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows SmartScreen Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityHigh
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What is the relationship between Mark of the Web and Windows SmartScreen?

When you download a file from the internet, Windows adds the zone identifier or Mark of the Web as an NTFS stream to the file. So, when you run the file, Windows SmartScreen checks if there is a zone identifier Alternate Data Stream (ADS) attached to the file. If the ADS indicates ZoneId=3 which means that the file was downloaded from the internet, the SmartScreen does a reputation check. For more information on SmartScreen, please visit Microsoft Defender SmartScreen overview | Microsoft Learn.


According to the CVSS metric, user interaction is required (UI:R) and privileges required  is low (PR:L). What does that mean for this vulnerability?

An authorized attacker must send the user a malicious file and convince the user to open it.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass the SmartScreen user experience.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L), a total loss of integrity (I:H), and some loss of availability (A:L). What does that mean for this vulnerability?

The vulnerability allows a malicious actor to inject code into SmartScreen and potentially gain code execution, which could potentially lead to some data exposure, lack of system availability, or both.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Moderate Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21351
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Moderate Security Feature Bypass 5034134 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Moderate Security Feature Bypass 5034134 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Moderate Security Feature Bypass 5034119 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Moderate Security Feature Bypass 5034119 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Moderate Security Feature Bypass 5034127 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Moderate Security Feature Bypass 5034127 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Moderate Security Feature Bypass 5034127 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Moderate Security Feature Bypass 5034122
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Moderate Security Feature Bypass 5034122
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Moderate Security Feature Bypass 5034122
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Moderate Security Feature Bypass
5034122
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Moderate Security Feature Bypass
5034122
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Moderate Security Feature Bypass
5034122
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Moderate Security Feature Bypass 5034121 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Moderate Security Feature Bypass 5034121 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Moderate Security Feature Bypass 5034123 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Moderate Security Feature Bypass 5034123 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Moderate Security Feature Bypass 5034123 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Moderate Security Feature Bypass 5034123 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2016 5034767 (Security Update) Moderate Security Feature Bypass 5034119 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Moderate Security Feature Bypass 5034127 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Moderate Security Feature Bypass 5034129
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21351 Eric Lawrence with Microsoft


CVE-2024-21352 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21352
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21352
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21352 Anonymous


CVE-2024-21354 - Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21354
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21354
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Elevation of Privilege 5034134 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Elevation of Privilege 5034134 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Elevation of Privilege 5034169
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Elevation of Privilege 5034169
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Elevation of Privilege 5034184 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Elevation of Privilege 5034184 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Elevation of Privilege 5034171 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Elevation of Privilege 5034171 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Elevation of Privilege 5034130 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21354 Yuki Chen with Cyber KunLun


CVE-2024-21357 - Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21357
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability?

This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21357
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Critical Remote Code Execution 5034134 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Critical Remote Code Execution 5034134 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Critical Remote Code Execution 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Critical Remote Code Execution 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Critical Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Critical Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Critical Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Critical Remote Code Execution 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Critical Remote Code Execution 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Critical Remote Code Execution 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Critical Remote Code Execution
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Critical Remote Code Execution
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Critical Remote Code Execution
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Critical Remote Code Execution 5034121 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Critical Remote Code Execution 5034121 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Critical Remote Code Execution 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Critical Remote Code Execution 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Critical Remote Code Execution 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Critical Remote Code Execution 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Critical Remote Code Execution 5034173
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Critical Remote Code Execution 5034173
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Critical Remote Code Execution 5034173
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Critical Remote Code Execution 5034173
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Critical Remote Code Execution 5034169
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Critical Remote Code Execution 5034169
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Critical Remote Code Execution 5034184 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Critical Remote Code Execution 5034184 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Critical Remote Code Execution 5034171 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Critical Remote Code Execution 5034171 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Critical Remote Code Execution 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Critical Remote Code Execution 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Critical Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Critical Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Critical Remote Code Execution 5034129
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Critical Remote Code Execution 5034129
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Critical Remote Code Execution 5034130 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21357 Anonymous


CVE-2024-21358 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21358
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21358
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21358 Anonymous


CVE-2024-21360 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21360
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21360
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21360 Anonymous


CVE-2024-21361 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21361
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21361
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21361 Anonymous


CVE-2024-21366 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21366
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21366
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21366 Anonymous


CVE-2024-21369 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21369
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21369
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21369 Anonymous


CVE-2024-21371 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21371
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21371
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Elevation of Privilege 5034134 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Elevation of Privilege 5034134 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Elevation of Privilege 5034184 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Elevation of Privilege 5034184 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Elevation of Privilege 5034171 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Elevation of Privilege 5034171 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Elevation of Privilege 5034130 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21371 None

CVE-2024-21372 - Windows OLE Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21372
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows OLE Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21372
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21372 Anonymous


CVE-2024-21375 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21375
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21375
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21375 Anonymous


CVE-2024-21379 - Microsoft Word Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21379
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Word Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21379
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Word 2016 (32-bit edition) 5002542 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None
Microsoft Word 2016 (64-bit edition) 5002542 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21379 Anonymous working with Trend Micro Zero Day Initiative


CVE-2024-21381 - Microsoft Azure Active Directory B2C Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21381
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Azure Active Directory B2C Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:6.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack.


How does the update address this vulnerability?

As part of Azure AD Business-to-Customer's (B2C) ongoing commitment to our customers, we recently rolled out an update to our behavior for the Proof Key for Code Exchange (PKCE) as outlined in our documentation here. This update adds additional enforcement on B2C’s /token endpoint – requiring that code redemption attempts that include the PKCE code_verifier parameter must also include an authorization code that was originally opted-in to PKCE behavior via the code_challenge parameter.

In effect, this change reduces the possibility for attackers to send fraudulent authorization codes to your consuming service, and is aligned with the “OAuth 2.0 Security Best Current Practice” document here.


What actions do customers need to take to protect themselves from this vulnerability?

The vast majority of customers have received the update automatically and do not need to take any action to update their applications. A small subset of customers are required to take an action and have been notified directly via Azure Service Health Alerts under Tracking ID: 6MFP-NTZ. If you did not receive this notification, there is no action required.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21381
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Azure Active Directory B2C Update Guidance (Security Update) Important Spoofing None Base: 6.8
Temporal: 6.1
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
Unknown No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21381 Anonymous


CVE-2024-21386 - .NET Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21386
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21386
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
ASP.NET Core 6.0 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
6.0.27 Maybe None
ASP.NET Core 7.0 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
7.0.16 Maybe None
ASP.NET Core 8.0 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
8.0.2 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
17.4.16 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
17.6.12 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
17.8.7 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21386 Brennan Conroy of Microsoft Corporation


CVE-2024-21389 - Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21389
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21389
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.1 5035110 (Security Update) Important Spoofing None Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
TBD Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21389 batram


CVE-2024-21393 - Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21393
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21393
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.1 5035110 (Security Update) Important Spoofing None Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
TBD Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21393 batram


CVE-2024-21394 - Dynamics 365 Field Service Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21394
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Dynamics 365 Field Service Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to navigate to a page with malicious content to be compromised by the attacker.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21394
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.1 5035110 (Security Update) Important Spoofing None Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
TBD Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21394 NGO VAN TU (@tusnj)


CVE-2024-21396 - Dynamics 365 Sales Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21396
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Dynamics 365 Sales Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21396
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.1 5035110 (Security Update) Important Spoofing None Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
TBD Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21396 Erik Donker


CVE-2024-21401 - Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21401
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An unauthenticated attacker (PR:N) could exploit this vulnerability by running a script to access a targeted Jira server over the internet.


Is there any action I need to take to be protected from this vulnerability?

Customers running the Azure AD Jira sso plugin need to update to version 1.1.2 from the Microsoft Download Center or from Atlassian Marketplace.


What privileges could an attacker gain with successful exploitation of this vulnerability?

An attacker does not need to login to exploit this vulnerability. Exploiting this vulnerability could allow an attacker to fully update Entra ID SAML metadata and info for the plugin. The attacker could then change the authentication of the application to their tenant as needed.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21401
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Entra Jira Single-Sign-On Plugin Release Notes (Security Update) Important Elevation of Privilege None Base: 9.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
1.1.2 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21401 thongvv of GE Security (VNG)


CVE-2024-21402 - Microsoft Outlook Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21402
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Outlook Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would gain the rights of the user that is running the affected application.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) and major loss of integrity (I:H) but have no effect on availability (A:N). What does that mean for this vulnerability?

Exploiting this vulnerability could allow an attacker to disclose files and modify data, but the attacker cannot impact the availability of the files.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21402
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Elevation of Privilege None Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Elevation of Privilege None Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21402 Aaron Erlandson, Trevor Harris, Jeff Klouda and Maggie Li


CVE-2024-21404 - .NET Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21404
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:

The following mitigating factors might be helpful in your situation:

Only .NET services running on non-Windows platforms are affected by this vulnerability. If your web server is running on Windows, an attacker cannot use this DoS vector to bring down your web server.


Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21404
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 6.0 5035119 (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
6.0.27 Maybe None
.NET 7.0 5035120 (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
7.0.16 Maybe None
.NET 8.0 5035121 (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
8.0.2 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
17.4.16 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
17.6.12 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
17.8.7 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21404 Bahaa Naamneh with Crosspoint Labs


CVE-2024-21413 - Microsoft Outlook Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21413
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Outlook Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.


If I am running Office 2016 (32-bit edition) or Office 2016 (64-bit edition, what do I need to do to be protected from this vulnerability?

To be protected, customers running Office 2016 need to install all the updates listed for their edition in the following tables.

For Office 2016 (32-bit edition):

Product Article Download Build Number
Microsoft Office 2016 (32-bit edition) 5002537 Security Update 16.0.5435.1001
Microsoft Office 2016 (32-bit edition) 5002467 Security Update 16.0.5435.1001
Microsoft Office 2016 (32-bit edition) 5002522 Security Update 16.0.5435.1001
Microsoft Office 2016 (32-bit edition) 5002469 Security Update 16.0.5435.1001
Microsoft Office 2016 (32-bit edition) 5002519 Security Update 16.0.5435.1001

For Office 2016 (64-bit edition):

Product Article Download Build Number
Microsoft Office 2016 (64-bit edition) 5002537 Security Update 16.0.5435.1001
Microsoft Office 2016 (64-bit edition) 5002467 Security Update 16.0.5435.1001
Microsoft Office 2016 (64-bit edition) 5002522 Security Update 16.0.5435.1001
Microsoft Office 2016 (64-bit edition) 5002469 Security Update 16.0.5435.1001
Microsoft Office 2016 (64-bit edition) 5002519 Security Update 16.0.5435.1001

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality.


How could the attacker exploit this vulnerability?

An attacker could craft a malicious link that bypasses the Protected View Protocol, which leads to the leaking of local NTLM credential information and remote code execution (RCE).


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21413
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Critical Remote Code Execution None Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Critical Remote Code Execution None Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2016 (32-bit edition) 5002537 (Security Update)
5002467 (Security Update)
5002522 (Security Update)
5002519 (Security Update)
Critical Remote Code Execution Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1001
16.0.5435.1000
Maybe None
Microsoft Office 2016 (64-bit edition) 5002537 (Security Update)
5002467 (Security Update)
5002522 (Security Update)
5002519 (Security Update)
Critical Remote Code Execution Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1001
16.0.5435.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution None Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution None Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Critical Remote Code Execution None Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Critical Remote Code Execution None Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21413 Haifei Li of Check Point Research (https://research.checkpoint.com/)


CVE-2024-21420 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21420
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21420
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21420 Anonymous


CVE-2024-20673 - Microsoft Office Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20673
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


If I am running Office 2016 (32-bit edition) or Office 2016 (64-bit edition, what do I need to do to be protected from this vulnerability?

To be protected, customers running Office 2016 need to install all the updates listed for their edition in the following tables.

For Office 2016 (32-bit edition):

Product Article Download Build Number
Microsoft Office 2016 (32-bit edition) 5002537 Security Update 16.0.5435.1001
Microsoft Office 2016 (32-bit edition) 5002467 Security Update 16.0.5435.1001
Microsoft Office 2016 (32-bit edition) 5002522 Security Update 16.0.5435.1001
Microsoft Office 2016 (32-bit edition) 5002469 Security Update 16.0.5435.1001
Microsoft Office 2016 (32-bit edition) 5002519 Security Update 16.0.5435.1001

For Office 2016 (64-bit edition):

Product Article Download Build Number
Microsoft Office 2016 (64-bit edition) 5002537 Security Update 16.0.5435.1001
Microsoft Office 2016 (64-bit edition) 5002467 Security Update 16.0.5435.1001
Microsoft Office 2016 (64-bit edition) 5002522 Security Update 16.0.5435.1001
Microsoft Office 2016 (64-bit edition) 5002469 Security Update 16.0.5435.1001
Microsoft Office 2016 (64-bit edition) 5002519 Security Update 16.0.5435.1001

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20673
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Excel 2016 (32-bit edition) 5002536 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None
Microsoft Excel 2016 (64-bit edition) 5002536 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None
Microsoft Office 2016 (32-bit edition) 5002537 (Security Update)
5002467 (Security Update)
5002522 (Security Update)
5002469 (Security Update)
Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1001 Maybe None
Microsoft Office 2016 (64-bit edition) 5002537 (Security Update)
5002467 (Security Update)
5002522 (Security Update)
5002469 (Security Update)
Important Remote Code Execution Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1001 Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft PowerPoint 2016 (32-bit edition) 5002495 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None
Microsoft PowerPoint 2016 (64-bit edition) 5002495 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None
Microsoft Publisher 2016 (32-bit edition) 5002492 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None
Microsoft Publisher 2016 (64-bit edition) 5002492 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None
Microsoft Visio 2016 (32-bit edition) 5002491 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None
Microsoft Visio 2016 (64-bit edition) 5002491 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None
Microsoft Word 2016 (32-bit edition) 5002542 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None
Microsoft Word 2016 (64-bit edition) 5002542 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None
Skype for Business 2016 (32-bit) 5002181 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None
Skype for Business 2016 (64-bit) 5002181 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20673 Anonymous


CVE-2024-20679 - Azure Stack Hub Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20679
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Stack Hub Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20679
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Stack Hub Release Notes (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.2311.1.22 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20679 Felix Boulet with Centre gouvernemental de cyberdéfense (CGCD)


CVE-2024-21304 - Trusted Compute Base Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21304
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Trusted Compute Base Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.1/TemporalScore:3.6
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21304
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2019 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Elevation of Privilege 5034130 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21304

CVE-2024-21315 - Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21315
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21315
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Defender for Endpoint for Windows on Windows 10 for 32-bit Systems 5032199 (Security Update) Important Elevation of Privilege 5031377 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20308 Yes None
Microsoft Defender for Endpoint for Windows on Windows 10 for x64-based Systems 5032199 (Security Update) Important Elevation of Privilege 5031377 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20308 Yes None
Microsoft Defender for Endpoint for Windows on Windows 10 Version 1607 for 32-bit Systems 5032197 (Security Update) Important Elevation of Privilege 5031362 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6452 Yes None
Microsoft Defender for Endpoint for Windows on Windows 10 Version 1607 for x64-based Systems 5032197 (Security Update) Important Elevation of Privilege 5031362 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6452 Yes None
Microsoft Defender for Endpoint for Windows on Windows 10 Version 1809 for 32-bit Systems 5032196 (Security Update) Important Elevation of Privilege 5031361
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5122
Yes 5032196
Microsoft Defender for Endpoint for Windows on Windows 10 Version 1809 for ARM64-based Systems 5032196 (Security Update) Important Elevation of Privilege 5031361
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5122
Yes 5032196
Microsoft Defender for Endpoint for Windows on Windows 10 Version 1809 for x64-based Systems 5032196 (Security Update) Important Elevation of Privilege 5031361
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5122
Yes 5032196
Microsoft Defender for Endpoint for Windows on Windows 10 Version 21H2 for 32-bit Systems 5032189 (Security Update) Important Elevation of Privilege 5031356
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19041.3693
Yes 5032189
Microsoft Defender for Endpoint for Windows on Windows 10 Version 21H2 for ARM64-based Systems 5032189 (Security Update) Important Elevation of Privilege
5031356
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19043.3693
Yes 5032189
Microsoft Defender for Endpoint for Windows on Windows 10 Version 21H2 for x64-based Systems 5032189 (Security Update) Important Elevation of Privilege
5031356
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19043.3693
Yes 5032189
Microsoft Defender for Endpoint for Windows on Windows 10 Version 22H2 for 32-bit Systems 5032189 (Security Update) Important Elevation of Privilege
5031356
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3693
Yes 5032189
Microsoft Defender for Endpoint for Windows on Windows 10 Version 22H2 for ARM64-based Systems 5032189 (Security Update) Important Elevation of Privilege
5031356
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3693
Yes 5032189
Microsoft Defender for Endpoint for Windows on Windows 10 Version 22H2 for x64-based Systems 5032189 (Security Update) Important Elevation of Privilege
5031356
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.3693
Yes 5032189
Microsoft Defender for Endpoint for Windows on Windows 11 version 21H2 for ARM64-based Systems 5032192 (Security Update) Important Elevation of Privilege 5031358
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2600
Yes 5032192
Microsoft Defender for Endpoint for Windows on Windows 11 version 21H2 for x64-based Systems 5032192 (Security Update) Important Elevation of Privilege 5031358
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2600
Yes 5032192
Microsoft Defender for Endpoint for Windows on Windows 11 Version 22H2 for ARM64-based Systems 5032190 (Security Update) Important Elevation of Privilege
5031354
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22621.2715
Yes 5032190
Microsoft Defender for Endpoint for Windows on Windows 11 Version 22H2 for x64-based Systems 5032190 (Security Update) Important Elevation of Privilege
5031354
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22621.2715
Yes 5032190
Microsoft Defender for Endpoint for Windows on Windows 11 Version 23H2 for ARM64-based Systems 5032190 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.2715
Yes 5032190
Microsoft Defender for Endpoint for Windows on Windows 11 Version 23H2 for x64-based Systems 5032190 (Security Update) Important Elevation of Privilege Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.2715
Yes 5032190
Microsoft Defender for Endpoint for Windows on Windows Server 2012 5034830 (Monthly Rollup) Important Elevation of Privilege 5034184 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Microsoft Defender for Endpoint for Windows on Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Elevation of Privilege 5034184 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Microsoft Defender for Endpoint for Windows on Windows Server 2012 R2 5034819 (Monthly Rollup) Important Elevation of Privilege 5034171 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Microsoft Defender for Endpoint for Windows on Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Elevation of Privilege 5034171 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Microsoft Defender for Endpoint for Windows on Windows Server 2016 5032197 (Security Update) Important Elevation of Privilege 5031362 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6452 Yes None
Microsoft Defender for Endpoint for Windows on Windows Server 2016 (Server Core installation) 5032197 (Security Update) Important Elevation of Privilege 5031362 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6452 Yes None
Microsoft Defender for Endpoint for Windows on Windows Server 2019 5032196 (Security Update) Important Elevation of Privilege 5031361
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5122
Yes 5032196
Microsoft Defender for Endpoint for Windows on Windows Server 2019 (Server Core installation) 5032196 (Security Update) Important Elevation of Privilege 5031361
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5122
Yes 5032196
Microsoft Defender for Endpoint for Windows on Windows Server 2022 5032198 (Security Update) Important Elevation of Privilege 5031364 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2113 Yes None
Microsoft Defender for Endpoint for Windows on Windows Server 2022 (Server Core installation) 5032247 (Monthly Rollup) Important Elevation of Privilege 5031442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24569 Yes None
Microsoft Defender for Endpoint for Windows on Windows Server 2022, 23H2 Edition (Server Core installation) 5032202 (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.531 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21315 Achmea Red Team with Achmea


Achmea Red Team with Achmea


CVE-2024-20695 - Skype for Business Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20695
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Skype for Business Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.0
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

This vulnerability's attack is limited at the protocol level to a logically adjacent topology. This means it cannot simply be done across the internet, but instead needs something specific tied to the target. Good examples would include the same shared physical network (such as Bluetooth or IEEE 802.11), logical network (local IP subnet), or from within a secure or otherwise limited administrative domain (MPLS, secure VPN to an administrative network zone). This is common to many attacks that require machine-in-the-middle (MITM) type setups or that rely on initially gaining a foothold in another environment.


What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is file content.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


There is no download information for Skype for Business Server 2019 CU7 in the Security Updates table. How do I protect myself from this vulnerability?

Follow the steps to create a file share as outlined in Create a file share in Skype for Business Server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20695
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Skype for Business Server 2019 CU7 Important Information Disclosure None Base: 5.7
Temporal: 5.0
Vector: CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20695 Fin Hume with WithSecure


CVE-2024-21328 - Dynamics 365 Sales Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21328
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Dynamics 365 Sales Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to navigate to a page with malicious content to be compromised by the attacker.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21328
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.1 5035110 (Security Update) Important Spoofing None Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
TBD Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21328 NGO VAN TU (@tusnj)


CVE-2024-20684 - Windows Hyper-V Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20684
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

Successful exploitation of this vulnerability could allow a Hyper-V guest to affect the functionality of the Hyper-V host.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Critical Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20684
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Critical Denial of Service 5034121 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Critical Denial of Service 5034121 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Critical Denial of Service 5034123 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Critical Denial of Service 5034123 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Critical Denial of Service 5034123 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Critical Denial of Service 5034123 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2022 5034770 (Security Update) Critical Denial of Service 5034129
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Critical Denial of Service 5034129
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Critical Denial of Service 5034130 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20684 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2024-21339 - Windows USB Generic Parent Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21339
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Generic Parent Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.4/TemporalScore:5.6
Base score metrics
Attack VectorPhysical
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21339
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21339 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-21341 - Windows Kernel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21341
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21341
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21341 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-21342 - Windows DNS Client Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21342
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Client Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21342
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Denial of Service 5034130 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21342 Anonymous


CVE-2024-21343 - Windows Network Address Translation (NAT) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21343
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.2
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21343
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Denial of Service 5034134 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Denial of Service 5034134 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Denial of Service 5034119 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Denial of Service 5034119 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Denial of Service 5034127 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Denial of Service 5034127 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Denial of Service 5034127 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Denial of Service 5034122
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Denial of Service 5034122
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Denial of Service 5034122
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Denial of Service
5034122
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Denial of Service
5034122
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Denial of Service
5034122
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Denial of Service 5034121 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Denial of Service 5034121 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Denial of Service 5034171 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Denial of Service 5034171 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Denial of Service 5034119 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Denial of Service 5034119 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Denial of Service 5034127 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Denial of Service 5034127 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Denial of Service 5034129
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Denial of Service 5034129
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Denial of Service 5034130 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21343 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-21344 - Windows Network Address Translation (NAT) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21344
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.2
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21344
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Denial of Service 5034134 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Denial of Service 5034134 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Denial of Service 5034119 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Denial of Service 5034119 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Denial of Service 5034127 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Denial of Service 5034127 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Denial of Service 5034127 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Denial of Service 5034122
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Denial of Service 5034122
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Denial of Service 5034122
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Denial of Service
5034122
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Denial of Service
5034122
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Denial of Service
5034122
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Denial of Service 5034121 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Denial of Service 5034121 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Denial of Service 5034171 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Denial of Service 5034171 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Denial of Service 5034119 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Denial of Service 5034119 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Denial of Service 5034127 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Denial of Service 5034127 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Denial of Service 5034129
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Denial of Service 5034129
Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Denial of Service 5034130 Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21344 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-21345 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21345
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

This vulnerability could lead to a contained execution environment escape. Please refer to AppContainer Isolation for more information.


How could an attacker exploit this vulnerability?

An authenticated attacker could run a specially crafted application that would give them control of the targeted destination and source of the copy.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21345
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Elevation of Privilege 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21345 Gabe Kirkpatrick


CVE-2024-21346 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21346
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21346
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Elevation of Privilege 5034130 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21346 Laith AL-Satari


Abdelhamid Naceri


CVE-2024-21347 - Microsoft ODBC Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21347
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21347
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21347 1/2 gojo satoru


CVE-2024-21348 - Internet Connection Sharing (ICS) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21348
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Internet Connection Sharing (ICS) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21348
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Denial of Service 5034134 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Denial of Service 5034134 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Denial of Service 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Denial of Service 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Denial of Service 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Denial of Service 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Denial of Service 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Denial of Service 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Denial of Service 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Denial of Service 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Denial of Service
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Denial of Service
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Denial of Service
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Denial of Service 5034121 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Denial of Service 5034121 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Denial of Service 5034184 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Denial of Service 5034184 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Denial of Service 5034171 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Denial of Service 5034171 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Denial of Service 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Denial of Service 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Denial of Service 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Denial of Service 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Denial of Service 5034129
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Denial of Service 5034129
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Denial of Service 5034130 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21348 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-21353 - Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21353
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21353
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21353 Anonymous


CVE-2024-21355 - Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21355
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21355
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Elevation of Privilege 5034134 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Elevation of Privilege 5034134 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Elevation of Privilege 5034169
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Elevation of Privilege 5034169
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Elevation of Privilege 5034184 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Elevation of Privilege 5034184 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Elevation of Privilege 5034171 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Elevation of Privilege 5034171 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Elevation of Privilege 5034130 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21355 Yuki Chen with Cyber KunLun


CVE-2024-21356 - Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21356
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21356
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Denial of Service 5034134 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Denial of Service 5034134 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Denial of Service 5034119 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Denial of Service 5034119 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Denial of Service 5034127 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Denial of Service 5034127 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Denial of Service 5034127 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Denial of Service 5034122
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Denial of Service 5034122
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Denial of Service 5034122
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Denial of Service
5034122
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Denial of Service
5034122
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Denial of Service
5034122
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Denial of Service 5034121 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Denial of Service 5034121 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Denial of Service 5034123 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Denial of Service 5034173
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Denial of Service 5034173
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Denial of Service 5034173
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Denial of Service 5034173
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Denial of Service 5034169
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Denial of Service 5034169
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Denial of Service 5034184 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Denial of Service 5034184 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Denial of Service 5034171 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Denial of Service 5034171 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Denial of Service 5034119 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Denial of Service 5034119 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Denial of Service 5034127 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Denial of Service 5034127 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Denial of Service 5034129
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Denial of Service 5034129
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Denial of Service 5034130 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21356 Microsoft Offensive Research & Security Engineering


CVE-2024-21359 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21359
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21359
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21359 Anonymous


CVE-2024-21362 - Windows Kernel Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21362
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass the Windows Code Integrity Guard (CIG).


According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of integrity (I:H). What does that mean for this vulnerability?

An authenticated attacker could replace valid file content with specially crafted file content.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21362
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Security Feature Bypass 5034134 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Security Feature Bypass 5034134 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Security Feature Bypass 5034119 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Security Feature Bypass 5034119 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Security Feature Bypass 5034127 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Security Feature Bypass 5034127 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Security Feature Bypass 5034127 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Security Feature Bypass 5034122
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Security Feature Bypass 5034122
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Security Feature Bypass 5034122
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Security Feature Bypass
5034122
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Security Feature Bypass
5034122
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Security Feature Bypass
5034122
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Security Feature Bypass 5034121 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Security Feature Bypass 5034121 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Security Feature Bypass 5034123 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Security Feature Bypass 5034123 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Security Feature Bypass 5034123 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Security Feature Bypass 5034123 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2016 5034767 (Security Update) Important Security Feature Bypass 5034119 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Security Feature Bypass 5034119 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Security Feature Bypass 5034127 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Security Feature Bypass 5034127 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Security Feature Bypass 5034129
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Security Feature Bypass 5034129
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Security Feature Bypass 5034130 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21362 Anonymous


CVE-2024-21363 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21363
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21363
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21363 Yuki Chen with Cyber KunLun


CVE-2024-21364 - Microsoft Azure Site Recovery Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21364
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Azure Site Recovery Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.3/TemporalScore:8.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities.


How could an attacker exploit this vulnerability?

An attacker with local access to a machine with Azure Site Recovery (ASR) can execute code that allows escalating privileges to IUSR (or Anonymous User Identity) and could discover MySQL root password, which could result in the discovery of other stored encrypted credentials.


Why is this CVE rated as Moderate severity?

The attacker can only elevate their privileges to Root on the specific system or database which they are targeting. System privileges cannot be gained and information relating to other systems or database can not be obtained after elevating their privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Moderate Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21364
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Site Recovery 5034599 (Security Update) Moderate Elevation of Privilege None Base: 9.3
Temporal: 8.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C
9.57 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21364 Chris Hernandez with Adversary Academy


CVE-2024-21365 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21365
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21365
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21365 Anonymous


CVE-2024-21367 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21367
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21367
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21367 Anonymous


CVE-2024-21368 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21368
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21368
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21368 Anonymous


CVE-2024-21370 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21370
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21370
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21370 Anonymous


CVE-2024-21374 - Microsoft Teams for Android Information Disclosure

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21374
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Teams for Android Information Disclosure
CVSS:

CVSS:3.1 Highest BaseScore:5.0/TemporalScore:4.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is information disclosure?

The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local (AV:L) and User Interaction is Required (UI:R), this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and run a malicious application. This could lead to a local attack on the user's device which could leak data.


How do I get the update for Teams for Android?

  1. Tap the Play Store icon on your home screen.
  2. Tap the circular account icon at the top right of the screen.
  3. Tap Manage apps & devices.
  4. Tap Updates available.
  5. Tap the Update button next to the Microsoft Teams app.

Is there a direct link on the web?

Yes: https://play.google.com/store/apps/details?id=com.microsoft.teams


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authenticated attacker could convince a user to confirm an action through a dialog box.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21374
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Teams for Android Release Notes (Security Update) Important Information Disclosure None Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.0.0.2024022302 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21374 Dimitrios Valsamaras of Microsoft


CVE-2024-21376 - Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21376
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.0/TemporalScore:8.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


Is there any action I need to take to be protected from this vulnerability?

Customers who do not have az confcom installed can install the latest version by executing az extension add -n confcom. Customers who are running versions prior to 0.3.3 need to update by executing az extension update -n confcom. For more information, see https://learn.microsoft.com/en-us/cli/azure/extension?view=azure-cli-latest#az-extension-update and Confidential computing plugin for Confidential VMs.


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An attacker who successfully exploited this vulnerability could steal credentials and affect resources beyond the security scope managed by Azure Kubernetes Service Confidential Containers (AKSCC).


How could an attacker exploit this vulnerability?

An attacker can access the untrusted AKS Kubernetes node and AKS Confidential Container to take over confidential guests and containers beyond the network stack it might be bound to.


According to the CVSS metric, privileges required is none (PR:N). Does the attacker need to be authenticated?

No. An unauthenticated attacker can move the same workload onto a machine they control, where the attacker is root.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21376
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Kubernetes Service Confidential Containers Release Notes (Security Update) Important Remote Code Execution None Base: 9.0
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C
0.3.3 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21376 Yuval Avrahami


CVE-2024-21377 - Windows DNS Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21377
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21377
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Information Disclosure 5034134 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Information Disclosure 5034134 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Information Disclosure 5034119 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Information Disclosure 5034119 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Information Disclosure 5034127 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Information Disclosure 5034127 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Information Disclosure 5034127 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Information Disclosure 5034122
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Information Disclosure 5034122
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Information Disclosure 5034122
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Information Disclosure
5034122
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Information Disclosure
5034122
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Information Disclosure
5034122
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Information Disclosure 5034121 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Information Disclosure 5034121 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Information Disclosure 5034123 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Information Disclosure 5034123 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Information Disclosure 5034123 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Information Disclosure 5034123 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Information Disclosure 5034171 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Information Disclosure 5034171 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Information Disclosure 5034119 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Information Disclosure 5034119 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Information Disclosure 5034127 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Information Disclosure 5034127 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Information Disclosure 5034129
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Information Disclosure 5034129
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Information Disclosure 5034130 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21377 STATE GRID INFORMATION&TELECOMMUNICATION BRANCH Wei Hu,Jingchu Wang


CVE-2024-21378 - Microsoft Outlook Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21378
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Outlook Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


According to the CVSS metric, user interaction is required (UI:R) and privileges required  is low (PR:L). What does that mean for this vulnerability?

An authorized attacker must send the user a malicious file and convince the user to open it.


According to the CVSS metric, privileges required is low (PR:L). Does the attacker need to be in an authenticated role on the Exchange Server?

Yes, the attacker must be authenticated with LAN-access and have credentials for a valid Exchange user.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21378
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Outlook 2016 (32-bit edition) 5002543 (Security Update) Important Remote Code Execution None Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None
Microsoft Outlook 2016 (64-bit edition) 5002543 (Security Update) Important Remote Code Execution None Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5435.1000 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21378 Nick Landers with NetSPI


CVE-2024-21380 - Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21380
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

This vulnerability could lead to the attacker gaining the ability to interact with other tenant’s applications and content.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

The attacker must be authenticated to be able to exploit this vulnerability.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H)? What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could craft a payload allowing them to access sensitive user data, which could result in unauthorized access to the victim's account or compromise of other confidential information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Critical Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21380
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 Business Central 2022 Release Wave 2 5035205 (Security Update) Critical Information Disclosure None Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Application Build 21.16.63199, Platform Build 21.0 Maybe None
Microsoft Dynamics 365 Business Central 2023 Release Wave 1 5035206 (Security Update) Critical Information Disclosure None Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Application Build 22.10.63195, Platform Build 22.0 Maybe None
Microsoft Dynamics 365 Business Central 2023 Release Wave 2 5035207 (Security Update) Critical Information Disclosure None Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
Application Build 23.4.15715, Platform Build 23.0. Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21380 Marco Niederberger with Logico Solutions AG


CVE-2024-21384 - Microsoft Office OneNote Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21384
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office OneNote Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21384
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21384 wh1tc & Zhiniang Peng


CVE-2024-21391 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21391
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published. This CVE was addressed by updates that were released in January 2024, but the CVE was inadvertently omitted from the January 2024 Security Updates. This is an informational change only. Customers who have already installed the January 2024 updates do not need to take any further action.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21391
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21391 Anonymous


CVE-2024-21395 - Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21395
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21395
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.1 5035110 (Security Update) Important Spoofing None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
TBD Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21395 Erik Donker


CVE-2024-21397 - Microsoft Azure File Sync Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21397
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Azure File Sync Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityLow
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker can create new files in directories they do not normally have access to. Those can only be on directories where Azure File Sync is configured, which could include SYSTEM directories. However, the attacker would not gain privileges to read, modify, or delete files.


According to the CVSS metrics, successful exploitation of this vulnerability would not impact confidentiality (C:N), but would have a major impact on integrity (I:H) and have less impact on availability (A:L). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could affect the integrity because they could create new files in system directories. Confidentiality is not affected by a successful attack, because the attacker cannot modify, delete, or read files. A successful exploitation could have come impact on availability because there could be some interruption to the availability of the file server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21397
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure File Sync v14.0 5023052 (Security Update) Important Elevation of Privilege None Base: 5.3
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L/E:P/RL:O/RC:C
16.2 Maybe None
Azure File Sync v15.0 5023052 (Security Update) Important Elevation of Privilege None Base: 5.3
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L/E:P/RL:O/RC:C
16.2 Maybe None
Azure File Sync v16.0 5023052 (Security Update) Important Elevation of Privilege None Base: 5.3
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L/E:P/RL:O/RC:C
16.2 Maybe None
Azure File Sync v17.0 5023054 (Security Update) Important Elevation of Privilege None Base: 5.3
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L/E:P/RL:O/RC:C
17.1 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21397 3wyeye5 with OSR


CVE-2024-21399 - Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21399
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.3/TemporalScore:7.2
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

This vulnerability could lead to a browser sandbox escape.


Why is the severity for this CVE rated as Moderate, but the CVSS score is higher than normal?

Per our severity guidelines, the amount of user interaction or preconditions required to allow this sort of exploitation downgraded the severity, specifically it says, "If a bug requires more than a click, a key press, or several preconditions, the severity will be downgraded". The CVSS scoring system doesn't allow for this type of nuance.


How could an attacker exploit this vulnerability via the Network?

An attacker could host a specially crafted website designed to exploit the vulnerability through Microsoft Edge and then convince a user to view the website. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action, typically by an enticement in an email or instant message, or by getting the user to open an attachment sent through email.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 121.0.2277.98 2/1/2024 121.0.6167.139/140
Extended Stable 120.0.2210.167 2/1/2024 120.0.6099.276

Mitigations:
None
Workarounds:
None
Revision:
1.0    01-Feb-24    

Information published.


Moderate Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21399
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Moderate Remote Code Execution None Base: 8.3
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
121.0.2277.98 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21399 Anonymous


CVE-2024-21403 - Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21403
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.0/TemporalScore:8.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


Is there any action I need to take to be protected from this vulnerability?

Customers who do not have az confcom installed can install the latest version by executing az extension add -n confcom. Customers who are running versions prior to 0.3.3 need to update by executing az extension update -n confcom. For more information, see https://learn.microsoft.com/en-us/cli/azure/extension?view=azure-cli-latest#az-extension-update and Confidential computing plugin for Confidential VMs.


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An attacker who successfully exploited this vulnerability could steal credentials and affect resources beyond the security scope managed by Azure Kubernetes Service Confidential Containers (AKSCC).


How could an attacker exploit this vulnerability?

An attacker can access the untrusted AKS Kubernetes node and AKS Confidential Container to take over confidential guests and containers beyond the network stack it might be bound to.


According to the CVSS metric, privileges required is none (PR:N). Does the attacker need to be authenticated?

No. An unauthenticated attacker can move the same workload onto a machine they control, where the attacker is root.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21403
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Kubernetes Service Confidential Containers Release Notes (Security Update) Important Elevation of Privilege None Base: 9.0
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C
0.3.3 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21403 Yuval Avrahami


CVE-2024-21405 - Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21405
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21405
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Elevation of Privilege 5034134 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Elevation of Privilege 5034134 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Elevation of Privilege 5034169
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Elevation of Privilege 5034169
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Elevation of Privilege 5034184 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Elevation of Privilege 5034184 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Elevation of Privilege 5034171 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Elevation of Privilege 5034171 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Elevation of Privilege 5034130 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21405 Yuki Chen with Cyber KunLun


CVE-2024-21406 - Windows Printing Service Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21406
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Printing Service Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

In most situations, an unauthenticated attacker could send a specially crafted packet to a targeted server utilizing the HTTP Protocol Stack (http.sys) to process packets.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21406
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Spoofing 5034134 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Spoofing 5034134 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Spoofing 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Spoofing 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Spoofing 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Spoofing 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Spoofing 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Spoofing 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Spoofing 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Spoofing 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Spoofing
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Spoofing
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Spoofing
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Spoofing 5034121 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Spoofing 5034121 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Spoofing 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Spoofing 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Spoofing 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Spoofing 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Spoofing 5034169
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Spoofing 5034169
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Spoofing 5034184 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Spoofing 5034184 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Spoofing 5034171 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Spoofing 5034171 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Spoofing 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Spoofing 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Spoofing 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Spoofing 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Spoofing 5034129
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Spoofing 5034129
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Spoofing 5034130 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21406 None

CVE-2024-21410 - Microsoft Exchange Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21410
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Where can I find more information about NTLM relay attacks?

Download Mitigating Pass the Hash (PtH) Attacks and Other Credential Theft, Version 1 and 2. This document discusses Pass-the-Hash (PtH) attacks against the Windows operating systems and provides holistic planning strategies that, when combined with the Windows security features, will provide a more effective defense against pass-the-hash attacks.


How could an attacker exploit this vulnerability?

An attacker could target an NTLM client such as Outlook with an NTLM credentials-leaking type vulnerability. The leaked credentials can then be relayed against the Exchange server to gain privileges as the victim client and to perform operations on the Exchange server on the victim's behalf. For more information about Exchange Server's support for Extended Protection for Authentication(EPA), please see Configure Windows Extended Protection in Exchange Server.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H) and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could relay a user's leaked Net-NTLMv2 hash against a vulnerable Exchange Server and authenticate as the user.


How do I protect myself from this vulnerability?

Prior to the Exchange Server 2019 Cumulative Update 14 (CU14) update, Exchange Server did not enable NTLM credentials Relay Protections (called Extended Protection for Authentication or EPA) by default. Without the protection enabled, an attacker can target Exchange Server to relay leaked NTLM credentials from other targets (for example Outlook). Exchange Server 2019 CU14 enables EPA by default on Exchange servers. For more information regarding this update, please refer to the latest Exchange Blog Post.

I'm running Microsoft Exchange Server 2016 Cumulative Update 23. How do I protect myself from this vulnerability?

Microsoft introduced Extended Protection support as an optional feature for Exchange Server 2016 CU23 with the August 2022 security update (build 15.01.2507.012). We strongly recommend to download the latest security update for Exchange Server 2016 CU23 prior turning Extended Protection by the help of the ExchangeExtendedProtectionManagement.ps1 on.

If I already ran the script that enables NTLM credentials Relay Protections am I protected from this vulnerability?

Yes. If, for example, you are running Exchange Server 2019 CU13 or earlier and you have previously run the script then you are protected from this vulnerability, however, Microsoft strongly suggests installing the latest cumulative update.

How can I determine if Extended Protection is configured as expected and if my Exchange Server is protected against this vulnerability?

Run the latest version of the Exchange Server Health Checker script. The script will provide you with an overview of the Extended Protection status of your server.


Mitigations:

The following mitigating factors might be helpful in your situation:

Consult the Exchange Extended Protection documentation and use the ExchangeExtendedProtectionManagement.ps1 script to turn on the Extended Protection for Authentication (EPA) for Exchange Servers.


Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21410
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 Critical Elevation of Privilege None Base: 9.8
Temporal: 9.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
Unknown Unknown None
Microsoft Exchange Server 2019 Cumulative Update 13 5035606 (Security Update) Critical Elevation of Privilege Base: 9.8
Temporal: 9.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
15.2.1544.004
Yes 5035606
Microsoft Exchange Server 2019 Cumulative Update 14 5035606 (Security Update) Critical Elevation of Privilege Base: 9.8
Temporal: 9.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
15.2.1544.004
Yes 5035606

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21410 Internally found by Microsoft


CVE-2024-21412 - Internet Shortcut Files Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21412
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Internet Shortcut Files Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


How could an attacker exploit the vulnerability?

An unauthenticated attacker could send the targeted user a specially crafted file that is designed to bypass displayed security checks. However, the attacker would have no way to force a user to view the attacker-controlled content. Instead, the attacker would have to convince them to take action by clicking on the file link.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21412
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Security Feature Bypass 5034127 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Security Feature Bypass 5034127 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Security Feature Bypass 5034127 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Security Feature Bypass 5034122
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Security Feature Bypass 5034122
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Security Feature Bypass 5034122
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Security Feature Bypass
5034122
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Security Feature Bypass
5034122
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Security Feature Bypass
5034122
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Security Feature Bypass 5034121 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Security Feature Bypass 5034121 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Security Feature Bypass 5034123 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Security Feature Bypass 5034123 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Security Feature Bypass 5034123 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Security Feature Bypass 5034123 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2019 5034768 (Security Update) Important Security Feature Bypass 5034127 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Security Feature Bypass 5034127 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Security Feature Bypass 5034129
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Security Feature Bypass 5034129
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Security Feature Bypass 5034130 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21412 Peter Girnus (gothburz) of Trend Micro's Zero Day Initiative with Trend Micro


Dima Lenz and Vlad Stolyarov of Google's Threat Analysis Group


dwbzn with Aura Information Security


CVE-2024-1060 - Chromium: CVE-2024-1060 Use after free in Canvas

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-1060
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-1060 Use after free in Canvas
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 121.0.2277.98 2/1/2024 121.0.6167.139/140
Extended Stable 120.0.2210.167 2/1/2024 120.0.6099.276

Mitigations:
None
Workarounds:
None
Revision:
1.0    01-Feb-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-1060
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
121.0.2277.98 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-1060 None

CVE-2024-1059 - Chromium: CVE-2024-1059 Use after free in WebRTC

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-1059
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-1059 Use after free in WebRTC
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 121.0.2277.98 2/1/2024 121.0.6167.139/140
Extended Stable 120.0.2210.167 2/1/2024 120.0.6099.276

Mitigations:
None
Workarounds:
None
Revision:
1.0    01-Feb-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-1059
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
121.0.2277.98 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-1059 None

CVE-2024-1077 - Chromium: CVE-2024-1077 Use after free in Network

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-1077
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-1077 Use after free in Network
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 121.0.2277.98 2/1/2024 121.0.6167.139/140
Extended Stable 120.0.2210.167 2/1/2024 120.0.6099.276

Mitigations:
None
Workarounds:
None
Revision:
1.0    01-Feb-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-1077
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
121.0.2277.98 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-1077 None

CVE-2024-21626 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21626
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.6/TemporalScore:8.6
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Feb-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21626
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM moby-runc (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1.1.9-4 Unknown None
CBL Mariner 2.0 x64 moby-runc (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1.1.9-4 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21626 None