This report contains detail for the following vulnerabilities:
CVE Issued by | Tag | CVE ID | CVE Title |
---|---|---|---|
Microsoft | .NET and Visual Studio | CVE-2024-21409 | .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability |
Microsoft | Azure | CVE-2024-29993 | Azure CycleCloud Elevation of Privilege Vulnerability |
Microsoft | Azure AI Search | CVE-2024-29063 | Azure AI Search Information Disclosure Vulnerability |
Microsoft | Azure Arc | CVE-2024-28917 | Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability |
Microsoft | Azure Compute Gallery | CVE-2024-21424 | Azure Compute Gallery Elevation of Privilege Vulnerability |
Microsoft | Azure Migrate | CVE-2024-26193 | Azure Migrate Remote Code Execution Vulnerability |
Microsoft | Azure Monitor | CVE-2024-29989 | Azure Monitor Agent Elevation of Privilege Vulnerability |
Microsoft | Azure Private 5G Core | CVE-2024-20685 | Azure Private 5G Core Denial of Service Vulnerability |
Microsoft | Azure SDK | CVE-2024-29992 | Azure Identity Library for .NET Information Disclosure Vulnerability |
Intel Corporation | Intel | CVE-2024-2201 | Intel: CVE-2024-2201 Branch History Injection |
Microsoft | Internet Shortcut Files | CVE-2024-29988 | SmartScreen Prompt Security Feature Bypass Vulnerability |
secalert@redhat.com | Mariner | CVE-2019-3816 | Unknown |
secalert@redhat.com | Mariner | CVE-2019-3833 | Unknown |
Microsoft | Microsoft Azure Kubernetes Service | CVE-2024-29990 | Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability |
Microsoft | Microsoft Brokering File System | CVE-2024-28905 | Microsoft Brokering File System Elevation of Privilege Vulnerability |
Microsoft | Microsoft Brokering File System | CVE-2024-28907 | Microsoft Brokering File System Elevation of Privilege Vulnerability |
Microsoft | Microsoft Brokering File System | CVE-2024-26213 | Microsoft Brokering File System Elevation of Privilege Vulnerability |
Microsoft | Microsoft Brokering File System | CVE-2024-28904 | Microsoft Brokering File System Elevation of Privilege Vulnerability |
Microsoft | Microsoft Defender for IoT | CVE-2024-29055 | Microsoft Defender for IoT Elevation of Privilege Vulnerability |
Microsoft | Microsoft Defender for IoT | CVE-2024-29053 | Microsoft Defender for IoT Remote Code Execution Vulnerability |
Microsoft | Microsoft Defender for IoT | CVE-2024-29054 | Microsoft Defender for IoT Elevation of Privilege Vulnerability |
Microsoft | Microsoft Defender for IoT | CVE-2024-21324 | Microsoft Defender for IoT Elevation of Privilege Vulnerability |
Microsoft | Microsoft Defender for IoT | CVE-2024-21323 | Microsoft Defender for IoT Remote Code Execution Vulnerability |
Microsoft | Microsoft Defender for IoT | CVE-2024-21322 | Microsoft Defender for IoT Remote Code Execution Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-3156 | Chromium: CVE-2024-3156 Inappropriate implementation in V8 |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2024-29049 | Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2024-29981 | Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-3159 | Chromium: CVE-2024-3159 Out of bounds memory access in V8 |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-3158 | Chromium: CVE-2024-3158 Use after free in Bookmarks |
Microsoft | Microsoft Install Service | CVE-2024-26158 | Microsoft Install Service Elevation of Privilege Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2024-26257 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Outlook | CVE-2024-20670 | Outlook for Windows Spoofing Vulnerability |
Microsoft | Microsoft Office SharePoint | CVE-2024-26251 | Microsoft SharePoint Server Spoofing Vulnerability |
Microsoft | Microsoft WDAC ODBC Driver | CVE-2024-26214 | Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-26244 | Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-26210 | Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability |
Microsoft | Role: DNS Server | CVE-2024-26233 | Windows DNS Server Remote Code Execution Vulnerability |
Microsoft | Role: DNS Server | CVE-2024-26231 | Windows DNS Server Remote Code Execution Vulnerability |
Microsoft | Role: DNS Server | CVE-2024-26227 | Windows DNS Server Remote Code Execution Vulnerability |
Microsoft | Role: DNS Server | CVE-2024-26223 | Windows DNS Server Remote Code Execution Vulnerability |
Microsoft | Role: DNS Server | CVE-2024-26221 | Windows DNS Server Remote Code Execution Vulnerability |
Microsoft | Role: DNS Server | CVE-2024-26224 | Windows DNS Server Remote Code Execution Vulnerability |
Microsoft | Role: DNS Server | CVE-2024-26222 | Windows DNS Server Remote Code Execution Vulnerability |
Microsoft | Role: Windows Hyper-V | CVE-2024-29064 | Windows Hyper-V Denial of Service Vulnerability |
Microsoft | SQL Server | CVE-2024-28937 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28938 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-29044 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28935 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28940 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28943 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28941 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28910 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28944 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28908 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28909 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-29985 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28906 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28926 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28933 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28934 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28927 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28930 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-29046 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28932 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-29047 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28931 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-29984 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28929 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28939 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28942 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-29043 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28936 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-29045 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28915 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28913 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28945 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-29048 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28912 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28914 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-29983 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-28911 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | SQL Server | CVE-2024-29982 | Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability |
Microsoft | Windows Authentication Methods | CVE-2024-29056 | Windows Authentication Elevation of Privilege Vulnerability |
Microsoft | Windows Authentication Methods | CVE-2024-21447 | Windows Authentication Elevation of Privilege Vulnerability |
Microsoft | Windows BitLocker | CVE-2024-20665 | BitLocker Security Feature Bypass Vulnerability |
Microsoft | Windows Compressed Folder | CVE-2024-26256 | libarchive Remote Code Execution Vulnerability |
Microsoft | Windows Cryptographic Services | CVE-2024-26228 | Windows Cryptographic Services Security Feature Bypass Vulnerability |
Microsoft | Windows Cryptographic Services | CVE-2024-29050 | Windows Cryptographic Services Remote Code Execution Vulnerability |
Microsoft | Windows Defender Credential Guard | CVE-2024-26237 | Windows Defender Credential Guard Elevation of Privilege Vulnerability |
Microsoft | Windows DHCP Server | CVE-2024-26212 | DHCP Server Service Denial of Service Vulnerability |
Microsoft | Windows DHCP Server | CVE-2024-26215 | DHCP Server Service Denial of Service Vulnerability |
Microsoft | Windows DHCP Server | CVE-2024-26195 | DHCP Server Service Remote Code Execution Vulnerability |
Microsoft | Windows DHCP Server | CVE-2024-26202 | DHCP Server Service Remote Code Execution Vulnerability |
Microsoft | Windows Distributed File System (DFS) | CVE-2024-29066 | Windows Distributed File System (DFS) Remote Code Execution Vulnerability |
Microsoft | Windows Distributed File System (DFS) | CVE-2024-26226 | Windows Distributed File System (DFS) Information Disclosure Vulnerability |
Microsoft | Windows DWM Core Library | CVE-2024-26172 | Windows DWM Core Library Information Disclosure Vulnerability |
Microsoft | Windows File Server Resource Management Service | CVE-2024-26216 | Windows File Server Resource Management Service Elevation of Privilege Vulnerability |
Microsoft | Windows HTTP.sys | CVE-2024-26219 | HTTP.sys Denial of Service Vulnerability |
Microsoft | Windows Internet Connection Sharing (ICS) | CVE-2024-26253 | Windows rndismp6.sys Remote Code Execution Vulnerability |
Microsoft | Windows Internet Connection Sharing (ICS) | CVE-2024-26252 | Windows rndismp6.sys Remote Code Execution Vulnerability |
Microsoft | Windows Kerberos | CVE-2024-26183 | Windows Kerberos Denial of Service Vulnerability |
Microsoft | Windows Kerberos | CVE-2024-26248 | Windows Kerberos Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2024-20693 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2024-26245 | Windows SMB Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2024-26229 | Windows CSC Service Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2024-26218 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Local Security Authority Subsystem Service (LSASS) | CVE-2024-26209 | Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability |
Microsoft | Windows Message Queuing | CVE-2024-26232 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
Microsoft | Windows Message Queuing | CVE-2024-26208 | Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability |
Microsoft | Windows Mobile Hotspot | CVE-2024-26220 | Windows Mobile Hotspot Information Disclosure Vulnerability |
Microsoft | Windows Proxy Driver | CVE-2024-26234 | Proxy Driver Spoofing Vulnerability |
Microsoft | Windows Remote Access Connection Manager | CVE-2024-28902 | Windows Remote Access Connection Manager Information Disclosure Vulnerability |
Microsoft | Windows Remote Access Connection Manager | CVE-2024-28900 | Windows Remote Access Connection Manager Information Disclosure Vulnerability |
Microsoft | Windows Remote Access Connection Manager | CVE-2024-28901 | Windows Remote Access Connection Manager Information Disclosure Vulnerability |
Microsoft | Windows Remote Access Connection Manager | CVE-2024-26255 | Windows Remote Access Connection Manager Information Disclosure Vulnerability |
Microsoft | Windows Remote Access Connection Manager | CVE-2024-26230 | Windows Telephony Server Elevation of Privilege Vulnerability |
Microsoft | Windows Remote Access Connection Manager | CVE-2024-26239 | Windows Telephony Server Elevation of Privilege Vulnerability |
Microsoft | Windows Remote Access Connection Manager | CVE-2024-26207 | Windows Remote Access Connection Manager Information Disclosure Vulnerability |
Microsoft | Windows Remote Access Connection Manager | CVE-2024-26217 | Windows Remote Access Connection Manager Information Disclosure Vulnerability |
Microsoft | Windows Remote Access Connection Manager | CVE-2024-26211 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability |
Microsoft | Windows Remote Procedure Call | CVE-2024-20678 | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2024-26200 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2024-26179 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2024-26205 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-29061 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-28921 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-20689 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-26250 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-28922 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-29062 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-20669 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-28898 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-20688 | Secure Boot Security Feature Bypass Vulnerability |
Lenovo | Windows Secure Boot | CVE-2024-23593 | Lenovo: CVE-2024-23593 Zero Out Boot Manager and drop to UEFI Shell |
Microsoft | Windows Secure Boot | CVE-2024-28896 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-28919 | Secure Boot Security Feature Bypass Vulnerability |
Lenovo | Windows Secure Boot | CVE-2024-23594 | Lenovo: CVE-2024-23594 Stack Buffer Overflow in LenovoBT.efi |
Microsoft | Windows Secure Boot | CVE-2024-28923 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-28903 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-26189 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-26240 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-28924 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-28897 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-28925 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-26175 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-28920 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-26194 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-26180 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-26171 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Secure Boot | CVE-2024-26168 | Secure Boot Security Feature Bypass Vulnerability |
Microsoft | Windows Storage | CVE-2024-29052 | Windows Storage Elevation of Privilege Vulnerability |
Microsoft | Windows Telephony Server | CVE-2024-26242 | Windows Telephony Server Elevation of Privilege Vulnerability |
Microsoft | Windows Update Stack | CVE-2024-26236 | Windows Update Stack Elevation of Privilege Vulnerability |
Microsoft | Windows Update Stack | CVE-2024-26235 | Windows Update Stack Elevation of Privilege Vulnerability |
Microsoft | Windows USB Print Driver | CVE-2024-26243 | Windows USB Print Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Virtual Machine Bus | CVE-2024-26254 | Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability |
Microsoft | Windows Win32K - ICOMP | CVE-2024-26241 | Win32k Elevation of Privilege Vulnerability |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||
CVE-2024-3156
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-3156 Inappropriate implementation in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    04-Apr-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-3156 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
123.0.2420.81 | No | None |
Microsoft Edge (Chromium-based) Extended Stable | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
122.0.2365.120 | No | None |
CVE ID | Acknowledgements |
CVE-2024-3156 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||
CVE-2024-3158
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-3158 Use after free in Bookmarks
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    04-Apr-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-3158 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
123.0.2420.81 | No | None |
Microsoft Edge (Chromium-based) Extended Stable | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
122.0.2365.120 | No | None |
CVE ID | Acknowledgements |
CVE-2024-3158 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||
CVE-2024-3159
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-3159 Out of bounds memory access in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    04-Apr-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-3159 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
123.0.2420.81 | No | None |
Microsoft Edge (Chromium-based) Extended Stable | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
122.0.2365.120 | No | None |
CVE ID | Acknowledgements |
CVE-2024-3159 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-20669
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to compromise admin credentials on the device. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-20669 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-20669 | Zammis Clark |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-20688
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component. What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-20688 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-20688 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-20689
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component. What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-20689 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-20689 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21409
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this remote code execution vulnerability? An authenticated attacker who successfully exploited a vulnerability in WordPad when closing a maliciously crafted .docx file could trigger execution of malicious code. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21409 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 6.0 | 5037336 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.29 | Maybe | None |
.NET 7.0 | 5037337 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
7.0.18 | Maybe | None |
.NET 8.0 | 5037338 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.0.4 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems | 5037034 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems | 5037034 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems | 5037034 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 | 5037034 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) | 5037034 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1607 for 32-bit Systems | 5036609 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1607 for x64-based Systems | 5036609 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems | 5037034 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems | 5037034 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems | 5037035 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems | 5037035 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems | 5037035 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems | 5037036 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems | 5037036 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems | 5037036 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems | 5037037 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems | 5037037 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2016 | 5036609 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2016 (Server Core installation) | 5036609 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 | 5037034 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) | 5037034 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 | 5037033 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) | 5037033 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems | 5037035 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9236.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems | 5037035 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9236.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems | 5037035 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9236.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems | 5037036 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9236.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems | 5037036 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9236.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems | 5037036 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9236.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems | 5037037 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9236.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems | 5037037 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9206.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems | 5036620 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9236.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems | 5036620 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9236.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 | 5037033 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9236.0 | Maybe | None |
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) | 5037033 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.9236.0 | Maybe | None |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 | 5037041 (Monthly Rollup) 5037128 (Security Only) |
Important | Remote Code Execution | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None | |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5037041 (Monthly Rollup) 5037128 (Security Only) |
Important | Remote Code Execution | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None | |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 | 5037041 (Monthly Rollup) 5037128 (Security Only) |
Important | Remote Code Execution | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None | |
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5037041 (Monthly Rollup) 5037128 (Security Only) |
Important | Remote Code Execution | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5037038 (Monthly Rollup) 5037127 (Security Only) |
Important | Remote Code Execution | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5037038 (Monthly Rollup) 5037127 (Security Only) |
Important | Remote Code Execution | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None | |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 | 5037039 (Monthly Rollup) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) | 5037039 (Monthly Rollup) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 | 5037040 (Monthly Rollup) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None |
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) | 5037040 (Monthly Rollup) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.7.4092.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5037127 (Security Only) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5037127 (Security Only) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 | 5037039 (Monthly Rollup) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) | 5037039 (Monthly Rollup) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 | 5037040 (Monthly Rollup) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) | 5037040 (Monthly Rollup) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
4.8.4718.0 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.14 | Maybe | None |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.8.9 | Maybe | None |
Microsoft Visual Studio 2022 version 17.9 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.9.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-21409 | wh1tc & Zhiniang Peng |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21424
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Compute Gallery Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain specific limited administrator privileges. According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? An authenticated attacker with Read permissions to an Azure Compute Gallery Virtual Machine (VM) deployment could replicate the disk into another VM and view the data it contains. However, they cannot remove or delete the disk from the targeted VM, nor can they alter the disk's data. What actions do customers need to take to protect themselves from this vulnerability? The vulnerability has been mitigated by the latest change to the Azure Compute Gallery (ACG) image creation permission requirements. Traditionally, read access on the Virtual Machine and disks/snapshots were required to import the VM/disk into an ACG image. To enhance the security posture and ensure that permissions are granted accurately at the appropriate access level during Virtual Machine Image creation in ACG, customers will be required to have write access on the source Virtual Machine and disks/snapshots/blobs. For information on how to update permissions, see What RBAC Permissions are required to create an ACG Image. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21424 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Compute Gallery | More Information (Security Update) | Important | Elevation of Privilege | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
Unknown | No | None |
CVE ID | Acknowledgements |
CVE-2024-21424 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26250
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26250 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26250 | Zammis Clark |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26252
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows rndismp6.sys Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? An unauthenticated attacker needs to physically connect a specially crafted USB device to exploit this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26252 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26252 | Wei in Kunlun Lab with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26253
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows rndismp6.sys Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? An unauthenticated attacker needs to physically connect a specially crafted USB device to exploit this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26253 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26253 | Wei in Kunlun Lab with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26254
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26254 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Denial of Service | 5035854 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Denial of Service | 5035854 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Denial of Service | 5035857 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Denial of Service | 5035857 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Denial of Service | 5035856 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26254 | Simon Xiao with Microsoft Xiaobo Wang with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26255
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26255 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Information Disclosure | 5035856 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26255 | George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26256
MITRE NVD Issuing CNA: Microsoft |
CVE Title: libarchive Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26256 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26256 | Terrynini with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26172
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows DWM Core Library Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26172 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Information Disclosure | 5035856 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26172 | He YiSheng, Zhang WangJunJie with Hillstone Network Security Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26179
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26179 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26179 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26200
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26200 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26200 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26205
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26205 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26205 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26158
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Install Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26158 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26158 | Simon Zuckerbraun of Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26232
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. How could an attacker exploit this vulnerability? Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server. Mitigations: Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation: The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel. You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine. Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26232 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26232 | Yuki Chen with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28920
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28920 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28920 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28922
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.1/TemporalScore:3.6
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28922 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28922 | Zammis Clark |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28921
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28921 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28921 | Zammis Clark |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28919
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28919 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28919 | Zammis Clark |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28923
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.4/TemporalScore:5.6
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28923 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28923 | Meir Bloya Meir Bloya |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28896
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28896 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28896 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28898
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.3/TemporalScore:5.5
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. How could an attacker successfully exploit this vulnerability? To exploit the vulnerability, an attacker who has physical access or Administrative rights to a target device could install a malicious .bcd file. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28898 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 6.3 Temporal: 5.5 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28898 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28901
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28901 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Information Disclosure | 5035856 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28901 | George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28902
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28902 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Information Disclosure | 5035856 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28902 | George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28903
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28903 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28903 | Pete Batard with Akeo Consulting |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28905
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires multiple conditions to be met, such as specific application behavior, user actions, manipulation of parameters passed to a function, and impersonation of an integrity level token. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability would gain the ability to escape the AppContainer and impersonate a non-AppContainer token. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28905 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28905 | Naceri with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28906
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28906 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28906 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28908
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28908 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28908 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28909
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28909 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28909 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28910
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28910 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28910 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28911
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28911 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28911 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28912
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28912 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28912 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28913
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28913 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28913 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28914
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28914 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28914 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28915
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28915 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28915 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28929
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28929 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | 5037570 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | 5037571 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.35 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.14 | Maybe | None |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.8.9 | Maybe | None |
Microsoft Visual Studio 2022 version 17.9 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.9.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-28929 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28931
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28931 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | 5037570 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | 5037571 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.35 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.14 | Maybe | None |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.8.9 | Maybe | None |
Microsoft Visual Studio 2022 version 17.9 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.9.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-28931 | Yuki Chen with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28932
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28932 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | 5037570 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | 5037571 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.35 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.14 | Maybe | None |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.8.9 | Maybe | None |
Microsoft Visual Studio 2022 version 17.9 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.9.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-28932 | Yuki Chen with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28936
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28936 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | 5037570 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | 5037571 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.35 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.14 | Maybe | None |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.8.9 | Maybe | None |
Microsoft Visual Studio 2022 version 17.9 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.9.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-28936 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28939
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28939 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28939 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28942
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28942 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28942 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28945
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28945 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28945 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-29043
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29043 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | 5037570 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | 5037571 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29043 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-29045
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29045 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29045 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-29047
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29047 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29047 | Sam Pope with MSRC Vulnerabilities & Mitigations Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29050
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Cryptographic Services Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? For successful exploitation, a malicious certificate needs to be imported on an affected system. An attacker could upload a certificate to a service that processes or imports certificates, or an attacker could convince an authenticated user to import a certificate on their system. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29050 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29050 | VictorV(Tang tianwen) with Kunlun Lab Erik Egsgard with Field Effect Software |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29063
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure AI Search Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.6
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could obtain sensitive API Keys. What actions do customers need to take to protect themselves from this vulnerability? The vulnerability has been mitigated by a recent update to Azure AI Search's backend infrastructure. Customers who are required to rotate specific credentials have been notified through Azure Service Health Alerts under TrackingID: WL1G-3TZ. See here for information on how to view Azure Service Health Alerts in the Azure Portal. Customers who did not receive this Azure Service Health Alert do not need to take any action to be protected against this vulnerability. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29063 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure AI Search | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 7.3 Temporal: 6.6 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C |
Unknown | No | None |
CVE ID | Acknowledgements |
CVE-2024-29063 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29064
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.2/TemporalScore:5.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29064 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Denial of Service | 5035858 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Denial of Service | 5035855 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Denial of Service | 5035854 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Denial of Service | 5035854 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Denial of Service | 5035855 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Denial of Service | 5035855 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Denial of Service | 5035857 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Denial of Service | 5035857 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Denial of Service | 5035856 | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29064 | HongZhenhao with TianGong Team of Legendsec at Qi'anxin Group |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29066
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Distributed File System (DFS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit a DFS namespace (non-default) out-of-bound write vulnerability that results in heap corruption, which could then be used to perform arbitrary code execution on the server's dfssvc.exe process which runs as SYSTEM user. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29066 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29066 | 3wyeye5 with OSR |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-20685
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Private 5G Core Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.2
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires multiple conditions to be met, such as specific application behavior, user actions, manipulation of parameters passed to a function, and impersonation of an integrity level token. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Moderate | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-20685 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Private 5G Core | Release Notes (Security Update) | Moderate | Denial of Service | None | Base: 5.9 Temporal: 5.2 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
2403.0-2 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-20685 | Salim S.I, Richard Y Lin, Atlas Huang (CTOne/TrendMicro) with Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-29981
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.9
Executive Summary: None FAQ: Why is the severity for this CVE rated as Moderate, but the CVSS score is higher than normal? Per our severity guidelines, the amount of user interaction or preconditions required to allow this sort of exploitation downgraded the severity, specifically it says, "If a bug requires more than a click, a key press, or several preconditions, the severity will be downgraded". The CVSS scoring system doesn't allow for this type of nuance. According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could cover and spoof elements of the UI. The modified information is only visual.
How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. Mitigations: None Workarounds: None Revision: 1.0    04-Apr-24     Information published. |
Low | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29981 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Low | Spoofing | None | Base: 4.3 Temporal: 3.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C |
123.0.2420.81 | No | None |
Microsoft Edge (Chromium-based) Extended Stable | Release Notes (Security Update) | Low | Spoofing | None | Base: N/A Temporal: N/A Vector: N/A |
122.0.2365.120 | No | None |
CVE ID | Acknowledgements |
CVE-2024-29981 | Hafiizh with https://www.linkedin.com/in/hafiizh-7aa6bb31/ |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-23594
MITRE NVD Issuing CNA: Lenovo |
CVE Title: Lenovo: CVE-2024-23594 Stack Buffer Overflow in LenovoBT.efi
CVSS: CVSS:3.1 Highest BaseScore:6.4/TemporalScore:5.6
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Why is this Lenovo CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in certain Lenovo bootloaders. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the vulnerability. Please see the following for more information: Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-23594 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 6.4 Temporal: 5.6 Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-23594 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29988
MITRE NVD Issuing CNA: Microsoft |
CVE Title: SmartScreen Prompt Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.2
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user needs to be tricked into running malicious files. How could an attacker exploit this vulnerability? To exploit this security feature bypass vulnerability, an attacker would need to convince a user to launch malicious files using a launcher application that requests that no UI be shown. How could an attacker exploit the vulnerability? In an email or instant message attack scenario, the attacker could send the targeted user a specially crafted file that is designed to exploit the remote code execution vulnerability. In any case an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could entice a user to either click a link that directs the user to the attacker's site or send a malicious attachment. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29988 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29988 | Dmitrij Lenz and Vlad Stolyarov of Google's Threat Analysis Group Peter Girnus (gothburz) of Trend Micro's Zero Day Initiative with Trend Micro |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29990
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.0/TemporalScore:8.1
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability. Is there any action I need to take to be protected from this vulnerability? Customer must ensure they are running the latest version of Customers who do not have
According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? An attacker who successfully exploited this vulnerability could steal credentials and affect resources beyond the security scope managed by Azure Kubernetes Service Confidential Containers (AKSCC). How could an attacker exploit this vulnerability? An attacker can access the untrusted AKS Kubernetes node and AKS Confidential Container to take over confidential guests and containers beyond the network stack it might be bound to. According to the CVSS metric, privileges required is none (PR:N). Does the attacker need to be authenticated? No. An unauthenticated attacker can move the same workload onto a machine they control, where the attacker is root. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29990 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Kubernetes Service Confidential Containers | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 9.0 Temporal: 8.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C |
0.3.4 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-29990 | Yuval Avrahami |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-2201
MITRE NVD Issuing CNA: Intel Corporation |
CVE Title: Intel: CVE-2024-2201 Branch History Injection
CVSS: CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.1
Executive Summary: This CVE was assigned by Intel. Please see CVE-2024-2201 on CVE.org for more information. FAQ: Why is this Intel CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in certain processor models offered by Intel. The mitigation for this vulnerability is disabled by default and manual action is required for customers to be protected. This CVE is being documented in the Security Update Guide to inform customers of the available mitigation and its potential performance impact. Please see the following for more information:
What steps are required to protect my system against the vulnerability? We are providing the following registry information to enable the mitigations for this CVE. Important: This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry see How to back up and restore the registry in Windows. To enable the mitigation for CVE-2024-2201 on Windows devices and clients using Intel Processors:
Customers who wish to implement the mitigation within their systems can also refer to the following for more information.
To enable the mitigation for CVE-2024-2201 on Linux devices and clients using Intel Processors:
Can I expect any performance impact after I configure the registry keys? In some cases, installing these updates will have a performance impact. In testing Microsoft has seen some performance impact with this mitigation. Microsoft values the security of its software and services but made the decision to allow users and administrators to evaluate the performance impact and risk exposure before deciding to enable the mitigation. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-2201 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Information Disclosure | 5035920 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Information Disclosure | 5035920 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Information Disclosure | 5035920 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Information Disclosure | 5035920 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Information Disclosure | 5035888 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Information Disclosure | 5035888 |
Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Information Disclosure | 5035930 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Information Disclosure | 5035930 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Information Disclosure | 5035856 | Base: 4.7 Temporal: 4.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-2201 | Will Dormann CERT/CC |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-20678
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated user could trigger this vulnerability. It does not require admin or other elevated privileges. What is RPC runtime? See Remote procedure call (RPC) for more information on RPC and RPC Runtime. How could an attacker exploit this vulnerability? To exploit this vulnerability, an authenticated attacker would need to send a specially crafted RPC call to an RPC host. This could result in remote code execution on the server side with the same permissions as the RPC service. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-20678 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-20678 | Microsoft Offensive Research & Security Engineering with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-20665
MITRE NVD Issuing CNA: Microsoft |
CVE Title: BitLocker Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to compromise admin credentials on the device. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-20665 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 6.1 Temporal: 5.3 Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-20665 | Zammis Clark |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-20693
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-20693 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-20693 | Thijs Alkemade with Computest Sector 7 Khaled Nassar with Computest Sector 7 Daan Keuper with Computest Sector 7 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21322
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Defender for IoT Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires the attacker to be an administrator of the web application. As is best practice, regular validation and audits of administrative groups should be conducted. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21322 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Defender for IoT | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
24.1.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-21322 | Siemens Energy |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21323
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Defender for IoT Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires the attacker to be able to send a malicious update package to the Defender for IoT sensor over the network. To do this, the attacker would first need to authenticate themselves and gain the necessary permissions to initiate the update process. How could an attacker exploit this vulnerability? Successful exploitation of this path traversal vulnerability would require an attacker to send a tar file to the Defender for IoT sensor. After the extraction process completed, the attacker could then send unsigned update packages and overwrite any file they chose. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21323 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Defender for IoT | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
24.1.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-21323 | Siemens Energy |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21324
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Defender for IoT Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain access to the credentials of other users on the system. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21324 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Defender for IoT | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
24.1.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-21324 | Siemens Energy |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21447
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Authentication Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21447 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21447 | Filip Dragović |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26193
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Migrate Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.4/TemporalScore:5.9
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is Adjacent (AV:A), the attack complexity is high (AC:H) and the privileges required is high (PR:H). What does this mean for this vulnerability? An authenticated attacker would need to have access to a proxy server created in the same or in an accessible network of the Appliance. What actions do customers need to take to protect themselves from this vulnerability? The vulnerability has been mitigated by the latest change to the Azure Migrate Appliance's AutoUpdater which ensures MSI installers downloaded from the Download Center have been authentically signed by Microsoft prior to installation. See here for information on how to ensure your Azure Migrate Appliance can get the latest Azure Migrate Agent and ConfigManager updates. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26193 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Migrate | More Information (Security Update) | Important | Remote Code Execution | None | Base: 6.4 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.294.1003 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26193 | Oran Moyal |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26168
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26168 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26168 | Zammis Clark |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26171
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26171 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26171 | Microsoft Offensive Research & Security Engineering Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26175
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26175 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26175 | Meir Bloya Meir Bloya Azure Yang with Kunlun Lab Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26180
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26180 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26180 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26183
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kerberos Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26183 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Denial of Service | 5035858 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Denial of Service | 5035858 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Denial of Service | 5035855 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Denial of Service | 5035855 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Denial of Service | 5035854 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Denial of Service | 5035854 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Denial of Service | 5035920 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Denial of Service | 5035920 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Denial of Service | 5035920 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Denial of Service | 5035920 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Denial of Service | 5035888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Denial of Service | 5035888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Denial of Service | 5035930 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Denial of Service | 5035930 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Denial of Service | 5035885 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Denial of Service | 5035885 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Denial of Service | 5035855 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Denial of Service | 5035855 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Denial of Service | 5035857 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Denial of Service | 5035857 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26183 | Hugo VINCENT with Synacktiv |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26189
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. How could an attacker successfully exploit this vulnerability? To exploit the vulnerability, an attacker who has physical access or Administrative rights to a target device could install a malicious .bcd file. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26189 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26189 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26194
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component. What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26194 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Security Feature Bypass | 5035888 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Security Feature Bypass | 5035888 |
Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 7.4 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26194 | Microsoft Offensive Research & Security Engineering |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26195
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DHCP Server Service Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26195 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26195 | luckyu with NorthSea wkai with Codesafe Team of Legendsec at QI-ANXIN Group |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26202
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DHCP Server Service Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26202 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26202 | luckyu with NorthSea |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26209
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26209 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Information Disclosure | 5035856 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26209 | Evan McBroom |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26218
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26218 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26218 | gabe_k |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26219
MITRE NVD Issuing CNA: Microsoft |
CVE Title: HTTP.sys Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26219 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Denial of Service | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Denial of Service | 5035854 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Denial of Service | 5035854 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Denial of Service | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Denial of Service | 5035857 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Denial of Service | 5035857 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Denial of Service | 5035856 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26219 | Aman Jain <amanjain@microsoft.com>, Steve Johnson <stevejohnson@microsoft.com> |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26220
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Mobile Hotspot Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.0/TemporalScore:4.4
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires a user to first turn on the Mobile Hotspot before the attacker starts the exploitation. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with guest/low privileges must first gain access to the local system, then wait for or trick the user into turning on the Mobile Hotspot feature. Only when the Mobile Hotspot is turned on does the vulnerability become exploitable. Therefore, this attack vector requires both attacker authentication (to access the local system) and user interaction (to turn on the Mobile Hotspot). Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26220 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Information Disclosure | 5035856 | Base: 5.0 Temporal: 4.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26220 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26221
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26221 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26221 | Rajesh Kumar with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26222
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26222 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26222 | Rajesh Kumar with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26223
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26223 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26223 | Rajesh Kumar with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26224
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26224 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26224 | Rajesh Kumar with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26227
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26227 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26227 | Rajesh Kumar with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26231
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26231 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26231 | Rajesh Kumar with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26233
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26233 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26233 | Rajesh Kumar with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26241
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26241 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26241 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26243
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows USB Print Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26243 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26243 | George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26248
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kerberos Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component. What privileges could be gained by an attacker who successfully exploited the vulnerability? A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level. Where can I find more information about what steps I need to take to be fully protected from this vulnerability? The updates released on or after April 9, 2024 will NOT fully address the security issues in this vulnerability. For more information about how to manage PAC validation changes related to this CVE and the steps you need to take to be fully protected, see How to manage PAC Validation changes related to CVE-2024-26248 and CVE-2024-29056. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26248 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26248 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26210
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26210 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | 5035857 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26210 | bee13oy with Cyber Kunlun Lab Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26229
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows CSC Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26229 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26229 | Erik Egsgard with Field Effect Software |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26234
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Proxy Driver Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26234 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Spoofing | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Spoofing | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Spoofing | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Spoofing | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Spoofing | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Spoofing | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Spoofing | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Spoofing | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Spoofing | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Spoofing | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Spoofing | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Spoofing | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Spoofing | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Spoofing | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Spoofing | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Spoofing | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Spoofing | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Spoofing | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Spoofing | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Spoofing | 5035920 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Spoofing | 5035920 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Spoofing | 5035920 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Spoofing | 5035920 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Spoofing | 5035888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Spoofing | 5035888 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Spoofing | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Spoofing | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Spoofing | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Spoofing | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Spoofing | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Spoofing | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Spoofing | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Spoofing | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Spoofing | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Spoofing | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Spoofing | 5035856 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26234 | Christopher Budd with Sophos |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26235
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Update Stack Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could overwrite arbitrary file content in the security context of the local system. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26235 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26235 | gabe_k |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26236
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Update Stack Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26236 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26236 | gabe_k ziming zhang with Ant Security Light-Year Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26237
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Defender Credential Guard Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26237 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26237 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26242
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Telephony Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could create or delete files in the security context of the “NT AUTHORITY\ LOCAL SERVICE” account. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26242 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26242 | k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26244
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26244 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26244 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26245
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows SMB Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26245 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26245 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26207
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26207 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Information Disclosure | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Information Disclosure | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Information Disclosure | 5035856 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26207 | George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26208
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? To successfully exploit this vulnerability, the target server must be configured to allow remote activation of the COM object. In addition, the attacker must have sufficient user privileges on that server. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26208 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | None | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | None | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26208 | wkai with Codesafe Team of Legendsec at QI-ANXIN Group |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26211
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26211 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26211 | George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26212
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DHCP Server Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26212 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Denial of Service | 5035920 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Denial of Service | 5035920 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Denial of Service | 5035920 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Denial of Service | 5035920 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Denial of Service | 5035888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Denial of Service | 5035888 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Denial of Service | 5035930 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Denial of Service | 5035930 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Denial of Service | 5035885 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Denial of Service | 5035885 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Denial of Service | 5035855 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Denial of Service | 5035855 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Denial of Service | 5035856 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26212 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26213
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26213 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26213 | gabe_k Naceri with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26214
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via OLEDB (CVSS metric AV:N), which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26214 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Remote Code Execution | 5035858 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Remote Code Execution | 5035845 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Remote Code Execution | 5035854 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Remote Code Execution | 5035853 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Remote Code Execution | 5035920 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Remote Code Execution | 5035888 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Remote Code Execution | 5035930 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Remote Code Execution | 5035885 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Remote Code Execution | 5035855 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Remote Code Execution | 5035849 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Remote Code Execution | 5035856 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26214 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26215
MITRE NVD Issuing CNA: Microsoft |
CVE Title: DHCP Server Service Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.2
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26215 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Denial of Service | 5035920 |
Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Denial of Service | 5035920 |
Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Denial of Service | 5035920 |
Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Denial of Service | 5035920 |
Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Denial of Service | 5035888 |
Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Denial of Service | 5035888 |
Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Denial of Service | 5035930 | Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Denial of Service | 5035930 | Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Denial of Service | 5035885 | Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Denial of Service | 5035885 | Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Denial of Service | 5035855 | Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Denial of Service | 5035855 | Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Denial of Service | 5035849 | Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Denial of Service | 5035856 | Base: 7.5 Temporal: 7.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26215 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26216
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows File Server Resource Management Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would only be able to delete targeted files on a system. According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with guest privileges must send a victim a malicious site and convince them to open it. How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then trigger an event that could exploit the vulnerability and save an invalid state to a database or trigger other unintended actions. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26216 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.3 Temporal: 6.4 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26216 | BeiBei Zhao YingLi Sun FangMing Gu QingHe Xie BeiBei Zhao, YingLi Sun, FangMing Gu and QingHe Xie |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26217
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26217 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Information Disclosure | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Information Disclosure | None | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Information Disclosure | 5035856 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26217 | George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26226
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Distributed File System (DFS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26226 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Information Disclosure | 5035920 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Information Disclosure | 5035920 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Information Disclosure | 5035920 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Information Disclosure | 5035920 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Information Disclosure | 5035888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Information Disclosure | 5035888 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Information Disclosure | 5035930 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Information Disclosure | 5035930 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Information Disclosure | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Information Disclosure | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Information Disclosure | 5035856 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26226 | George Hughey with MSRC Vulnerabilities & Mitigations k0shl with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26228
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Cryptographic Services Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass RSA signature verification on a vulnerable system. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26228 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Security Feature Bypass | 5035888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Security Feature Bypass | 5035888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26228 | Microsoft Offensive Research & Security Engineering |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26230
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Telephony Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26230 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26230 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26239
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Telephony Server Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26239 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Elevation of Privilege | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26239 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26240
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. How could an attacker successfully exploit this vulnerability? To exploit the vulnerability, an attacker who has physical access or Administrative rights to a target device could install a malicious .bcd file. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26240 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Security Feature Bypass | 5035888 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Security Feature Bypass | 5035888 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-26240 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26251
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft SharePoint Server Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.8/TemporalScore:6.5
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires multiple conditions to be met, such as specific application behavior, user actions, manipulation of parameters passed to a function, and impersonation of an integrity level token. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26251 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft SharePoint Server 2016 | 5002583 (Security Update) | Important | Spoofing | None | Base: 6.8 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:H/RL:O/RC:C |
16.0.5443.1000 | Maybe | None |
Microsoft SharePoint Server 2019 | 5002580 (Security Update) | Important | Spoofing | 5002562 | Base: 6.8 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:H/RL:O/RC:C |
16.0.10409.20027 | Maybe | None |
Microsoft SharePoint Server Subscription Edition | 5002581 (Security Update) | Important | Spoofing | None | Base: 6.8 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:H/RL:O/RC:C |
16.0.17328.20246 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-26251 | Kajetan Rostojek |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-26257
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.5
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Are the updates for the Microsoft Office 2021 for Mac currently available? The security update for Microsoft Office 2021 for Mac is not immediately available. The update will be released as soon as possible, and when it is available, customers will be notified via a revision to this CVE information. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-26257 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 7.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC for Mac 2021 | Important | Remote Code Execution | None | Base: N/A Temporal: N/A Vector: N/A |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-26257 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28924
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to compromise admin credentials on the device. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28924 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28924 | Zammis Clark |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28925
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28925 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Security Feature Bypass | 5035920 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Security Feature Bypass | 5035888 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Security Feature Bypass | 5035888 |
Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 8.0 Temporal: 7.0 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28925 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28897
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28897 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28897 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28900
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28900 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Information Disclosure | 5035858 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Information Disclosure | 5035845 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Information Disclosure | 5035854 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Information Disclosure | 5035853 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Information Disclosure | 5035885 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Information Disclosure | 5035855 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Information Disclosure | 5035849 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Information Disclosure | 5035857 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Information Disclosure | 5035856 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28900 | George Hughey with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28904
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could overwrite arbitrary file content in the security context of the local system. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker would only be able to delete targeted files on a system. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires multiple conditions to be met, such as specific application behavior, user actions, manipulation of parameters passed to a function, and impersonation of an integrity level token. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28904 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28904 | Naceri with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28907
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition and also to take additional actions prior to exploitation to prepare the target environment. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain the ability to create or open a new registry key without enforcing access checking. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28907 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28907 | Naceri with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-28917
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.2/TemporalScore:5.4
Executive Summary: None FAQ: According to the CVSS metric, Confidentiality is high (C:H) but integrity is none (I:N) and availability is none (A:N). What does that mean for this vulnerability? An attacker who successfully exploited this vulnerability could gain access to sensitive information such as Azure IoT Operations secrets and potentially other credentials or access tokens stored within the Kubernetes cluster. What actions do customers need to take to protect themselves from this vulnerability? In addition to updating any affected Extensions which are used in their environment, to be protected customers must also update their Azure Arc Agent to version >= 1.14.6 using the steps described here: https://learn.microsoft.com/en-us/cli/azure/connectedk8s?view=azure-cli-latest#az-connectedk8s-upgrade. According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability? An attacker must have access to the network connected to the targeted Arc-enabled Kubernetes Cluster but does not require permissions to connect or manage the Kubernetes cluster to exploit the vulnerability. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? The vulnerability enables an attacker to compromise a Cluster Extension's identity token and access other components or Azure resources associated with the Arc-enabled Kubernetes cluster. What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could leverage the Azure Arc Cluster Extension's identity token by bypassing the Kubernetes namespace's RBAC and access other Azure resources on behalf of the Extension. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28917 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Arc Cluster microsoft.azstackhci.operator Extension | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
5.0.5 | Maybe | None |
Azure Arc Cluster microsoft.azure.hybridnetwork Extension | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.0.2620-162 | Maybe | None |
Azure Arc Cluster microsoft.azurekeyvaultsecretsprovider Extension | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.5.2 | Maybe | None |
Azure Arc Cluster microsoft.iotoperations.mq Extension | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
0.3.0-preview | Maybe | None |
Azure Arc Cluster microsoft.networkfabricserviceextension Extension | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
5.1.3 | Maybe | None |
Azure Arc Cluster microsoft.openservicemesh Extension | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.2.6 | Maybe | None |
Azure Arc Cluster microsoft.videoindexer Extension | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 6.2 Temporal: 5.4 Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C |
1.1.2 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-28917 | Vladimir Abramzon with Microsoft Offensive Research Security Engineering |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28926
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28926 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28926 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28927
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28927 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28927 | Anonymous Sam Pope with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28930
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28930 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | 5037570 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | 5037571 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.35 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.14 | Maybe | None |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.8.9 | Maybe | None |
Microsoft Visual Studio 2022 version 17.9 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.9.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-28930 | Yuki Chen with Cyber KunLun Yuki Chen with Cyber KunLun VictorV(Tang tianwen) with Kunlun Lab VictorV(Tang tianwen) with Kunlun Lab bee13oy with Cyber Kunlun Lab bee13oy with Cyber Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28933
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28933 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | 5037570 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | 5037571 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.35 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.14 | Maybe | None |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.8.9 | Maybe | None |
Microsoft Visual Studio 2022 version 17.9 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.9.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-28933 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28934
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28934 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | 5037570 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | 5037571 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.35 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.14 | Maybe | None |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.8.9 | Maybe | None |
Microsoft Visual Studio 2022 version 17.9 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.9.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-28934 | Anonymous bee13oy with Cyber Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28935
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28935 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | 5037570 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | 5037571 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.35 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.14 | Maybe | None |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.8.9 | Maybe | None |
Microsoft Visual Studio 2022 version 17.9 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.9.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-28935 | Anonymous Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28937
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28937 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | 5037570 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | 5037571 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.35 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.14 | Maybe | None |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.8.9 | Maybe | None |
Microsoft Visual Studio 2022 version 17.9 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.9.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-28937 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28938
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via ODBC. This could result in the database returning malicious data that might cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28938 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | 5037570 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | 5037571 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.11.35 | Maybe | None |
Microsoft Visual Studio 2022 version 17.4 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.4.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.6.14 | Maybe | None |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.8.9 | Maybe | None |
Microsoft Visual Studio 2022 version 17.9 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.9.6 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-28938 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28940
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28940 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28940 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28941
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28941 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | 5037570 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | 5037571 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28941 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28943
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable). I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28943 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft ODBC Driver 17 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 17 for SQL Server on Windows | 5037570 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
17.10.6.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Linux | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on MacOS | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft ODBC Driver 18 for SQL Server on Windows | 5037571 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.3.3.1 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28943 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-28944
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-28944 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-28944 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-29044
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29044 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29044 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-29046
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client. I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29046 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29046 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-29048
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29048 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29048 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-29049
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.1/TemporalScore:3.6
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:N). What does that mean for this vulnerability? There are limited impact to Confidentiality and Integrity and no Avaibility impact from exploiting this vulnerability. An attacker would need to combine this with other vulnerabilities to perform an attack.
Mitigations: None Workarounds: None Revision: 1.0    04-Apr-24     Information published. |
Moderate | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29049 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Moderate | Spoofing | None | Base: 4.1 Temporal: 3.6 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C |
123.0.2420.81 | No | None |
Microsoft Edge (Chromium-based) Extended Stable | Release Notes (Security Update) | Moderate | Spoofing | None | Base: N/A Temporal: N/A Vector: N/A |
122.0.2365.120 | No | None |
CVE ID | Acknowledgements |
CVE-2024-29049 | Abdan Mukhithon Alkayyis |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29052
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Storage Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could gain administrator privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29052 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Elevation of Privilege | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Elevation of Privilege | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Elevation of Privilege | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29052 | Christopher Lee (cubeof11) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29053
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Defender for IoT Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. How could an attacker exploit this vulnerability? An authenticated attacker with access to the file upload feature could exploit this path traversal vulnerability by uploading malicious files to sensitive locations on the server. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29053 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Defender for IoT | Release Notes (Security Update) | Critical | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
24.1.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-29053 | Siemens Energy Siemens Energy |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29055
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Defender for IoT Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29055 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Defender for IoT | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
24.1.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-29055 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29054
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Defender for IoT Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29054 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Defender for IoT | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.2 Temporal: 6.3 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
24.1.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-29054 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29056
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Authentication Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Executive Summary: None FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability). Where can I find more information about what steps I need to take to be fully protected from this vulnerability? The updates released on or after April 9, 2024 will NOT fully address the security issues in this vulnerability. For more information about how to manage PAC validation changes related to this CVE and the steps you need to take to be fully protected, see How to manage PAC Validation changes related to CVE-2024-26248 and CVE-2024-29056. What privileges could be gained by an attacker who successfully exploited the vulnerability? A user from a cross-organization trust might obtain access that is granted to all users in an organization. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29056 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5036932 (Monthly Rollup) 5036950 (Security Only) |
Important | Elevation of Privilege | 5035920 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22618 |
Yes | 5036932 5036950 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5036967 (Monthly Rollup) 5036922 (Security Only) |
Important | Elevation of Privilege | 5035888 |
Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27067 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Elevation of Privilege | 5035930 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Elevation of Privilege | 5035885 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Elevation of Privilege | 5035855 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Elevation of Privilege | 5035849 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Elevation of Privilege | 5035857 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Elevation of Privilege | 5035856 | Base: 4.3 Temporal: 3.8 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29056 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29061
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29061 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29061 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29062
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability? An authenticated attacker could exploit this vulnerability with LAN access. According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability? An unauthorized attacker must wait for a user to initiate a connection. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29062 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 for x64-based Systems | 5036925 (Security Update) | Important | Security Feature Bypass | 5035858 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20596 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2012 | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 (Server Core installation) | 5036969 (Monthly Rollup) | Important | Security Feature Bypass | 5035930 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24821 | Yes | None |
Windows Server 2012 R2 | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5036960 (Monthly Rollup) | Important | Security Feature Bypass | 5035885 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.21924 | Yes | None |
Windows Server 2016 | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2016 (Server Core installation) | 5036899 (Security Update) | Important | Security Feature Bypass | 5035855 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.6897 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29062 | Azure Yang with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-20670
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Outlook for Windows Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of NTLM hashes. How could an attacker exploit this vulnerability? External attackers could send specially crafted emails that will cause a connection from the victim to an untrusted location of attackers' control. This will leak the Net-NTLMv2 hash of the victim to the untrusted network which an attacker can then relay to another service and authenticate as the victim. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker would have to send the victim a malicious URL that the victim would have to execute. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-20670 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Outlook for Windows | Release Notes (Security Update) | Important | Spoofing | None | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
1.2023.0322.0100 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-20670 | Michael Pizzicaroli with Charles Schwab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-29982
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29982 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29982 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-29983
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29983 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29983 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-29984
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29984 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29984 | Anonymous Sam Pope with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-29985
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: I am running SQL Server on my system. What action do I need to take? Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates. I am running my own application on my system. What action do I need to take? Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability. I am running an application from a software vendor on my system. What action do I need to take? Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
What are the GDR and CU update designations and how do they differ? The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
For any given baseline, either the GDR or CU updates could be options (see below).
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path. Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)? Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29985 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OLE DB Driver 18 for SQL Server | 5037572 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
18.7.0002.0 | Maybe | None |
Microsoft OLE DB Driver 19 for SQL Server | 5037573 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
19.3.0003.0 | Maybe | None |
Microsoft SQL Server 2019 for x64-based Systems (CU 25) | 5036335 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.4360.2 | Yes | None |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | 5035434 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
15.0.2110.4 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (CU 12) | 5036343 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.4120.1 | Yes | None |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | 5035432 (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.1115.1 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29985 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-23593
MITRE NVD Issuing CNA: Lenovo |
CVE Title: Lenovo: CVE-2024-23593 Zero Out Boot Manager and drop to UEFI Shell
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass Secure Boot. Why is this Lenovo CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in certain Lenovo bootloaders. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the vulnerability. Please see the following for more information: Are there additional steps I need to take to be protected from this vulnerability? All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-23593 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for ARM64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 1809 for x64-based Systems | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows 10 Version 21H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 21H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for 32-bit Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for ARM64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 10 Version 22H2 for x64-based Systems | 5036892 (Security Update) | Important | Security Feature Bypass | 5035845 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4291 |
Yes | 5036892 |
Windows 11 version 21H2 for ARM64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 version 21H2 for x64-based Systems | 5036894 (Security Update) | Important | Security Feature Bypass | 5035854 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.2899 | Yes | None |
Windows 11 Version 22H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3435 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5036893 (Security Update) | Important | Security Feature Bypass | 5035853 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3447 | Yes | None |
Windows Server 2019 | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2019 (Server Core installation) | 5036896 (Security Update) | Important | Security Feature Bypass | 5035849 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.5696 | Yes | None |
Windows Server 2022 | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022 (Server Core installation) | 5036909 (Security Update) | Important | Security Feature Bypass | 5035857 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2402 | Yes | None |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5036910 (Security Update) | Important | Security Feature Bypass | 5035856 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.830 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-23593 | Zammis Clark |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29989
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Monitor Agent Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: None FAQ: According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities. What actions do customers need to take to protect themselves from this vulnerability? Customers who have disabled Automatic Extension Upgrades or would like to upgrade an extension immediately must manually update their Azure Monitor Agent to the latest version. For more information on how to perform a manual update, see Manage Azure Monitor Agent. According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability? This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data that could include data that results in the service being unavailable. How could an attacker exploit this vulnerability and what privileges could an attacker gain? An authenticated attacker with read access permissions can exploit this vulnerability to perform arbitrary file and folder deletion on the host where the Azure Monitor Agent is installed. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29989 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Monitor Agent | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:U/RL:O/RC:C |
1.24.0 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-29989 | Fangming Gu Filip Dragović R4nger & Zhiniang Peng |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||
CVE-2024-29992
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Identity Library for .NET Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.3
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is data inside the targeted website like IDs, tokens, nonces, and other sensitive information. Which credential types provided by the Azure Identity client library are affected? The vulnerability exists in the following credential types: Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Moderate | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29992 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Identity Library for .NET | Release Notes (Security Update) | Moderate | Information Disclosure | None | Base: 5.5 Temporal: 5.3 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/RL:O/RC:C |
1.11.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-29992 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29993
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure CycleCloud Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? The attacker who successfully exploited this vulnerability could elevate privileges to the SuperUser role in the affected Azure CycleCloud instance. According to the CVSS metric, privileges required is Low (PR:L). What does that mean for this vulnerability? To exploit this vulnerability an attacker must have an account with the User role assigned. Mitigations: None Workarounds: None Revision: 1.0    09-Apr-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29993 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure CycleCloud 8.6.0 | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.1 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-29993 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2019-3816
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Apr-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2019-3816 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | openwsman (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.6.8-13 | Unknown | None |
CBL Mariner 2.0 x64 | openwsman (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.6.8-13 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2019-3816 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2019-3833
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Apr-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2019-3833 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | openwsman (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.6.8-13 | Unknown | None |
CBL Mariner 2.0 x64 | openwsman (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.6.8-13 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2019-3833 | None |