Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
Microsoft.NET CVE-2024-21386 .NET Denial of Service Vulnerability
Microsoft.NET CVE-2024-21404 .NET Denial of Service Vulnerability
MicrosoftAzure Active Directory CVE-2024-21401 Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability
MicrosoftAzure Active Directory CVE-2024-21381 Microsoft Azure Active Directory B2C Spoofing Vulnerability
MicrosoftAzure Connected Machine Agent CVE-2024-21329 Azure Connected Machine Agent Elevation of Privilege Vulnerability
MicrosoftAzure DevOps CVE-2024-20667 Azure DevOps Server Remote Code Execution Vulnerability
MicrosoftAzure File Sync CVE-2024-21397 Microsoft Azure File Sync Elevation of Privilege Vulnerability
MicrosoftAzure Site Recovery CVE-2024-21364 Microsoft Azure Site Recovery Elevation of Privilege Vulnerability
MicrosoftAzure Stack CVE-2024-20679 Azure Stack Hub Spoofing Vulnerability
MicrosoftInternet Shortcut Files CVE-2024-21412 Internet Shortcut Files Security Feature Bypass Vulnerability
security-advisories@github.comMariner CVE-2024-21626 Unknown
MicrosoftMicrosoft ActiveX CVE-2024-21349 Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
MicrosoftMicrosoft Azure Kubernetes Service CVE-2024-21403 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
MicrosoftMicrosoft Azure Kubernetes Service CVE-2024-21376 Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability
MicrosoftMicrosoft Defender for Endpoint CVE-2024-21315 Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21393 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21389 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21395 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21380 Microsoft Dynamics Business Central/NAV Information Disclosure Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21328 Dynamics 365 Sales Spoofing Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21394 Dynamics 365 Field Service Spoofing Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21396 Dynamics 365 Sales Spoofing Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21327 Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-1284 Chromium: CVE-2024-1284 Use after free in Mojo
MicrosoftMicrosoft Edge (Chromium-based) CVE-2024-21399 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-1060 Chromium: CVE-2024-1060 Use after free in Canvas
ChromeMicrosoft Edge (Chromium-based) CVE-2024-1077 Chromium: CVE-2024-1077 Use after free in Network
ChromeMicrosoft Edge (Chromium-based) CVE-2024-1283 Chromium: CVE-2024-1283 Heap buffer overflow in Skia
ChromeMicrosoft Edge (Chromium-based) CVE-2024-1059 Chromium: CVE-2024-1059 Use after free in WebRTC
MicrosoftMicrosoft Exchange Server CVE-2024-21410 Microsoft Exchange Server Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office CVE-2024-21413 Microsoft Outlook Remote Code Execution Vulnerability
MicrosoftMicrosoft Office CVE-2024-20673 Microsoft Office Remote Code Execution Vulnerability
MicrosoftMicrosoft Office OneNote CVE-2024-21384 Microsoft Office OneNote Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Outlook CVE-2024-21378 Microsoft Outlook Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Outlook CVE-2024-21402 Microsoft Outlook Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office Word CVE-2024-21379 Microsoft Word Remote Code Execution Vulnerability
MicrosoftMicrosoft Teams for Android CVE-2024-21374 Microsoft Teams for Android Information Disclosure
MicrosoftMicrosoft WDAC ODBC Driver CVE-2024-21353 Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21370 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21350 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21368 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21359 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21365 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21367 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21420 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21366 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21369 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21375 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21361 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21358 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21391 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21360 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21352 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Windows CVE-2024-21406 Windows Printing Service Spoofing Vulnerability
MicrosoftMicrosoft Windows DNS CVE-2024-21377 Windows DNS Information Disclosure Vulnerability
MITRERole: DNS Server CVE-2023-50387 MITRE: CVE-2023-50387 DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers
MicrosoftRole: DNS Server CVE-2024-21342 Windows DNS Client Denial of Service Vulnerability
MicrosoftSkype for Business CVE-2024-20695 Skype for Business Information Disclosure Vulnerability
MicrosoftSQL Server CVE-2024-21347 Microsoft ODBC Driver Remote Code Execution Vulnerability
MicrosoftTrusted Compute Base CVE-2024-21304 Trusted Compute Base Elevation of Privilege Vulnerability
MicrosoftWindows Hyper-V CVE-2024-20684 Windows Hyper-V Denial of Service Vulnerability
MicrosoftWindows Internet Connection Sharing (ICS) CVE-2024-21343 Windows Network Address Translation (NAT) Denial of Service Vulnerability
MicrosoftWindows Internet Connection Sharing (ICS) CVE-2024-21348 Internet Connection Sharing (ICS) Denial of Service Vulnerability
MicrosoftWindows Internet Connection Sharing (ICS) CVE-2024-21357 Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
MicrosoftWindows Internet Connection Sharing (ICS) CVE-2024-21344 Windows Network Address Translation (NAT) Denial of Service Vulnerability
MicrosoftWindows Kernel CVE-2024-21371 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-21338 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-21341 Windows Kernel Remote Code Execution Vulnerability
MicrosoftWindows Kernel CVE-2024-21345 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-21362 Windows Kernel Security Feature Bypass Vulnerability
MicrosoftWindows Kernel CVE-2024-21340 Windows Kernel Information Disclosure Vulnerability
MicrosoftWindows LDAP - Lightweight Directory Access Protocol CVE-2024-21356 Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
MicrosoftWindows Message Queuing CVE-2024-21363 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2024-21355 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
MicrosoftWindows Message Queuing CVE-2024-21405 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
MicrosoftWindows Message Queuing CVE-2024-21354 Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
MicrosoftWindows OLE CVE-2024-21372 Windows OLE Remote Code Execution Vulnerability
MicrosoftWindows SmartScreen CVE-2024-21351 Windows SmartScreen Security Feature Bypass Vulnerability
MicrosoftWindows USB Serial Driver CVE-2024-21339 Windows USB Generic Parent Driver Remote Code Execution Vulnerability
MicrosoftWindows Win32K - ICOMP CVE-2024-21346 Win32k Elevation of Privilege Vulnerability

CVE-2024-1283 - Chromium: CVE-2024-1283 Heap buffer overflow in Skia

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-1283
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-1283 Heap buffer overflow in Skia
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 121.0.2277.113 2/8/2024 121.0.6167.160/161
Extended Stable 120.0.2210.175 2/8/2024 120.0.6099.283

Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Feb-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-1283
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
121.0.2277.113 No None
Microsoft Edge (Chromium-based) Extended Stable Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
120.0.2210.175 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-1283 None

CVE-2024-1284 - Chromium: CVE-2024-1284 Use after free in Mojo

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-1284
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-1284 Use after free in Mojo
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 121.0.2277.113 2/8/2024 121.0.6167.160/161
Extended Stable 120.0.2210.175 2/8/2024 120.0.6099.283

Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Feb-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-1284
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
121.0.2277.113 No None
Microsoft Edge (Chromium-based) Extended Stable Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
120.0.2210.175 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-1284 None

CVE-2024-20667 - Azure DevOps Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20667
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure DevOps Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N), attack complexity is high (AC:H), and privilege required is low (PR:L). What is the target used in the context of the remote code execution?

Successful exploitation of this vulnerability requires the attacker to have Queue Build permissions and for the target Azure DevOps pipeline to meet certain conditions for an attacker to exploit this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20667
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure DevOps Server 2019.1.2 Release Notes (Security Update) Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
20240126.6 Maybe None
Azure DevOps Server 2020.1.2 Release Notes (Security Update) Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
20240126.2 Maybe None
Azure DevOps Server 2022.1 Release Notes (Security Update) Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
20240126.4 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20667 None

CVE-2023-50387 - MITRE: CVE-2023-50387 DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-50387
MITRE
NVD

Issuing CNA: MITRE

CVE Title: MITRE: CVE-2023-50387 DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolvers
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-50387
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Denial of Service 5034169
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Denial of Service 5034169
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Denial of Service 5034184 Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Denial of Service 5034184 Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Denial of Service 5034171 Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Denial of Service 5034171 Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Denial of Service 5034119 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Denial of Service 5034119 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Denial of Service 5034127 Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Denial of Service 5034127 Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Denial of Service 5034129
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Denial of Service 5034129
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Denial of Service 5034130 Base: N/A
Temporal: N/A
Vector: N/A
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-50387 Elias Heftrig, Haya Schulmann, Niklas Vogel, and Michael Waidner from the German National Research Center for Applied Cybersecurity ATHENE


CVE-2024-21327 - Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21327
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to navigate to a page with malicious content to be compromised by the attacker.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21327
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 Customer Engagement V9.1 5035110 (Security Update) Important Spoofing None Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
TBD Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21327 Dhiral Patel


CVE-2024-21329 - Azure Connected Machine Agent Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21329
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

A non-admin local user who has sufficient permissions to create symbolic links on a Windows computer that has Azure Connected Machine Agent installed (or before the agent is installed) could create links from a directory used by the agent to other privileged files on the computer. If the administrator later installs virtual machine extensions on the machine, those files could be deleted.


What privileges could an attacker gain with successful exploitation?

An attacker who successfully exploited the vulnerability could add symlinks and cause an arbitrary file delete as SYSTEM.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21329
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Connected Machine Agent Release Notes (Security Update) Important Elevation of Privilege None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.38 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21329 R4nger & Zhiniang Peng


CVE-2024-21338 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21338
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21338
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2019 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Elevation of Privilege 5034130 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21338 Jan Vojtěšek with Avast


CVE-2024-21340 - Windows Kernel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21340
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.6/TemporalScore:4.0
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21340
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Information Disclosure 5034134 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Information Disclosure 5034134 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Information Disclosure 5034119 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Information Disclosure 5034119 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Information Disclosure 5034127 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Information Disclosure 5034127 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Information Disclosure 5034127 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Information Disclosure 5034122
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Information Disclosure 5034122
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Information Disclosure 5034122
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Information Disclosure
5034122
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Information Disclosure
5034122
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Information Disclosure
5034122
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Information Disclosure 5034121 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Information Disclosure 5034121 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Information Disclosure 5034123 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Information Disclosure 5034123 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Information Disclosure 5034123 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Information Disclosure 5034123 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Information Disclosure 5034173
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Information Disclosure 5034173
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Information Disclosure 5034173
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Information Disclosure 5034173
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Information Disclosure 5034169
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Information Disclosure 5034169
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Information Disclosure 5034184 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Information Disclosure 5034184 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Information Disclosure 5034171 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Information Disclosure 5034171 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Information Disclosure 5034119 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Information Disclosure 5034119 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Information Disclosure 5034127 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Information Disclosure 5034127 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Information Disclosure 5034129
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Information Disclosure 5034129
Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Information Disclosure 5034130 Base: 4.6
Temporal: 4.0
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21340 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-21349 - Microsoft ActiveX Data Objects Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21349
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


How could an attacker exploit this vulnerability?

An attacker would need to set up a malicious server and create a proof-of-concept script. The victim would then need to be convinced, possibly through social engineering techniques, to run this script, which would connect to the malicious server and potentially allow for remote code execution on the victim’s machine.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21349
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21349 Anonymous


CVE-2024-21350 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21350
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21350
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21350 Anonymous


CVE-2024-21351 - Windows SmartScreen Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21351
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows SmartScreen Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityHigh
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What is the relationship between Mark of the Web and Windows SmartScreen?

When you download a file from the internet, Windows adds the zone identifier or Mark of the Web as an NTFS stream to the file. So, when you run the file, Windows SmartScreen checks if there is a zone identifier Alternate Data Stream (ADS) attached to the file. If the ADS indicates ZoneId=3 which means that the file was downloaded from the internet, the SmartScreen does a reputation check. For more information on SmartScreen, please visit Microsoft Defender SmartScreen overview | Microsoft Learn.


According to the CVSS metric, user interaction is required (UI:R) and privileges required  is low (PR:L). What does that mean for this vulnerability?

An authorized attacker must send the user a malicious file and convince the user to open it.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass the SmartScreen user experience.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L), a total loss of integrity (I:H), and some loss of availability (A:L). What does that mean for this vulnerability?

The vulnerability allows a malicious actor to inject code into SmartScreen and potentially gain code execution, which could potentially lead to some data exposure, lack of system availability, or both.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Moderate Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21351
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Moderate Security Feature Bypass 5034134 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Moderate Security Feature Bypass 5034134 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Moderate Security Feature Bypass 5034119 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Moderate Security Feature Bypass 5034119 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Moderate Security Feature Bypass 5034127 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Moderate Security Feature Bypass 5034127 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Moderate Security Feature Bypass 5034127 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Moderate Security Feature Bypass 5034122
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Moderate Security Feature Bypass 5034122
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Moderate Security Feature Bypass 5034122
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Moderate Security Feature Bypass
5034122
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Moderate Security Feature Bypass
5034122
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Moderate Security Feature Bypass
5034122
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Moderate Security Feature Bypass 5034121 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Moderate Security Feature Bypass 5034121 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Moderate Security Feature Bypass 5034123 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Moderate Security Feature Bypass 5034123 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Moderate Security Feature Bypass 5034123 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Moderate Security Feature Bypass 5034123 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2016 5034767 (Security Update) Moderate Security Feature Bypass 5034119 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Moderate Security Feature Bypass 5034127 Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Moderate Security Feature Bypass 5034129
Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21351 Eric Lawrence with Microsoft


CVE-2024-21352 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21352
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21352
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21352 Anonymous


CVE-2024-21354 - Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21354
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21354
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Elevation of Privilege 5034134 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Elevation of Privilege 5034134 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege 5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Elevation of Privilege
5034122
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Elevation of Privilege 5034121 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Elevation of Privilege 5034123 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Elevation of Privilege 5034173
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Elevation of Privilege 5034169
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Elevation of Privilege 5034169
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Elevation of Privilege 5034184 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Elevation of Privilege 5034184 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Elevation of Privilege 5034171 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Elevation of Privilege 5034171 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Elevation of Privilege 5034119 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Elevation of Privilege 5034127 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Elevation of Privilege 5034129
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Elevation of Privilege 5034130 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21354 Yuki Chen with Cyber KunLun


CVE-2024-21357 - Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21357
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability?

This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21357
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Critical Remote Code Execution 5034134 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Critical Remote Code Execution 5034134 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Critical Remote Code Execution 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Critical Remote Code Execution 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Critical Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Critical Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Critical Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Critical Remote Code Execution 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Critical Remote Code Execution 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Critical Remote Code Execution 5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Critical Remote Code Execution
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Critical Remote Code Execution
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Critical Remote Code Execution
5034122
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Critical Remote Code Execution 5034121 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Critical Remote Code Execution 5034121 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Critical Remote Code Execution 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Critical Remote Code Execution 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Critical Remote Code Execution 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Critical Remote Code Execution 5034123 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Critical Remote Code Execution 5034173
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Critical Remote Code Execution 5034173
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Critical Remote Code Execution 5034173
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Critical Remote Code Execution 5034173
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Critical Remote Code Execution 5034169
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Critical Remote Code Execution 5034169
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Critical Remote Code Execution 5034184 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Critical Remote Code Execution 5034184 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Critical Remote Code Execution 5034171 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Critical Remote Code Execution 5034171 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Critical Remote Code Execution 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Critical Remote Code Execution 5034119 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Critical Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Critical Remote Code Execution 5034127 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Critical Remote Code Execution 5034129
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Critical Remote Code Execution 5034129
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Critical Remote Code Execution 5034130 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21357 Anonymous


CVE-2024-21358 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21358
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21358
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21358 Anonymous


CVE-2024-21360 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21360
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21360
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21360 Anonymous


CVE-2024-21361 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21361
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21361
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21361 Anonymous


CVE-2024-21366 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21366
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21366
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21366 Anonymous


CVE-2024-21369 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21369
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21369
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Remote Code Execution 5034134 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 Version 1607 for 32-bit Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1607 for x64-based Systems 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows 10 Version 1809 for 32-bit Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 1809 for x64-based Systems 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 21H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution 5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4046
Yes 5034763
Windows 10 Version 22H2 for 32-bit Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for ARM64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 10 Version 22H2 for x64-based Systems 5034763 (Security Update) Important Remote Code Execution
5034122
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4046
Yes 5034763
Windows 11 version 21H2 for ARM64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 version 21H2 for x64-based Systems 5034766 (Security Update) Important Remote Code Execution 5034121 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2777 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 22H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3155 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows 11 Version 23H2 for x64-based Systems 5034765 (Security Update) Important Remote Code Execution 5034123 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3155 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5034795 (Monthly Rollup)
5034833 (Security Only)
Important Remote Code Execution 5034173
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22511
Yes 5034795
5034833
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5034831 (Monthly Rollup)
5034809 (Security Only)
Important Remote Code Execution 5034169
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.26961 Yes None
Windows Server 2012 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 (Server Core installation) 5034830 (Monthly Rollup) Important Remote Code Execution 5034184 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24710 Yes None
Windows Server 2012 R2 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2012 R2 (Server Core installation) 5034819 (Monthly Rollup) Important Remote Code Execution 5034171 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21813 Yes None
Windows Server 2016 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2016 (Server Core installation) 5034767 (Security Update) Important Remote Code Execution 5034119 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6709 Yes None
Windows Server 2019 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2019 (Server Core installation) 5034768 (Security Update) Important Remote Code Execution 5034127 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5458 Yes None
Windows Server 2022 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022 (Server Core installation) 5034770 (Security Update) Important Remote Code Execution 5034129
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2322
Yes 5034770
Windows Server 2022, 23H2 Edition (Server Core installation) 5034769 (Security Update) Important Remote Code Execution 5034130 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.709 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21369 Anonymous


CVE-2024-21371 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21371
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Feb-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21371
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5034774 (Security Update) Important Elevation of Privilege 5034134 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20469 Yes None
Windows 10 for x64-based Systems 5034774 (Security Update) Important Elevation