Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
Microsoft.NET and Visual Studio CVE-2024-21409 .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
MicrosoftAzure CVE-2024-29993 Azure CycleCloud Elevation of Privilege Vulnerability
MicrosoftAzure AI Search CVE-2024-29063 Azure AI Search Information Disclosure Vulnerability
MicrosoftAzure Arc CVE-2024-28917 Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability
MicrosoftAzure Compute Gallery CVE-2024-21424 Azure Compute Gallery Elevation of Privilege Vulnerability
MicrosoftAzure Migrate CVE-2024-26193 Azure Migrate Remote Code Execution Vulnerability
MicrosoftAzure Monitor CVE-2024-29989 Azure Monitor Agent Elevation of Privilege Vulnerability
MicrosoftAzure Private 5G Core CVE-2024-20685 Azure Private 5G Core Denial of Service Vulnerability
MicrosoftAzure SDK CVE-2024-29992 Azure Identity Library for .NET Information Disclosure Vulnerability
Intel CorporationIntel CVE-2024-2201 Intel: CVE-2024-2201 Branch History Injection
MicrosoftInternet Shortcut Files CVE-2024-29988 SmartScreen Prompt Security Feature Bypass Vulnerability
secalert@redhat.comMariner CVE-2019-3816 Unknown
secalert@redhat.comMariner CVE-2019-3833 Unknown
MicrosoftMicrosoft Azure Kubernetes Service CVE-2024-29990 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
MicrosoftMicrosoft Brokering File System CVE-2024-28905 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Brokering File System CVE-2024-28907 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Brokering File System CVE-2024-26213 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Brokering File System CVE-2024-28904 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Defender for IoT CVE-2024-29055 Microsoft Defender for IoT Elevation of Privilege Vulnerability
MicrosoftMicrosoft Defender for IoT CVE-2024-29053 Microsoft Defender for IoT Remote Code Execution Vulnerability
MicrosoftMicrosoft Defender for IoT CVE-2024-29054 Microsoft Defender for IoT Elevation of Privilege Vulnerability
MicrosoftMicrosoft Defender for IoT CVE-2024-21324 Microsoft Defender for IoT Elevation of Privilege Vulnerability
MicrosoftMicrosoft Defender for IoT CVE-2024-21323 Microsoft Defender for IoT Remote Code Execution Vulnerability
MicrosoftMicrosoft Defender for IoT CVE-2024-21322 Microsoft Defender for IoT Remote Code Execution Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-3156 Chromium: CVE-2024-3156 Inappropriate implementation in V8
MicrosoftMicrosoft Edge (Chromium-based) CVE-2024-29049 Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
MicrosoftMicrosoft Edge (Chromium-based) CVE-2024-29981 Microsoft Edge (Chromium-based) Spoofing Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-3159 Chromium: CVE-2024-3159 Out of bounds memory access in V8
ChromeMicrosoft Edge (Chromium-based) CVE-2024-3158 Chromium: CVE-2024-3158 Use after free in Bookmarks
MicrosoftMicrosoft Install Service CVE-2024-26158 Microsoft Install Service Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office Excel CVE-2024-26257 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Outlook CVE-2024-20670 Outlook for Windows Spoofing Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2024-26251 Microsoft SharePoint Server Spoofing Vulnerability
MicrosoftMicrosoft WDAC ODBC Driver CVE-2024-26214 Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-26244 Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-26210 Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26233 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26231 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26227 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26223 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26221 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26224 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26222 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2024-29064 Windows Hyper-V Denial of Service Vulnerability
MicrosoftSQL Server CVE-2024-28937 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28938 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29044 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28935 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28940 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28943 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28941 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28910 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28944 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28908 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28909 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29985 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28906 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28926 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28933 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28934 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28927 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28930 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29046 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28932 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29047 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28931 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29984 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28929 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28939 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28942 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29043 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28936 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29045 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28915 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28913 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28945 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29048 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28912 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28914 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29983 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28911 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29982 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftWindows Authentication Methods CVE-2024-29056 Windows Authentication Elevation of Privilege Vulnerability
MicrosoftWindows Authentication Methods CVE-2024-21447 Windows Authentication Elevation of Privilege Vulnerability
MicrosoftWindows BitLocker CVE-2024-20665 BitLocker Security Feature Bypass Vulnerability
MicrosoftWindows Compressed Folder CVE-2024-26256 libarchive Remote Code Execution Vulnerability
MicrosoftWindows Cryptographic Services CVE-2024-26228 Windows Cryptographic Services Security Feature Bypass Vulnerability
MicrosoftWindows Cryptographic Services CVE-2024-29050 Windows Cryptographic Services Remote Code Execution Vulnerability
MicrosoftWindows Defender Credential Guard CVE-2024-26237 Windows Defender Credential Guard Elevation of Privilege Vulnerability
MicrosoftWindows DHCP Server CVE-2024-26212 DHCP Server Service Denial of Service Vulnerability
MicrosoftWindows DHCP Server CVE-2024-26215 DHCP Server Service Denial of Service Vulnerability
MicrosoftWindows DHCP Server CVE-2024-26195 DHCP Server Service Remote Code Execution Vulnerability
MicrosoftWindows DHCP Server CVE-2024-26202 DHCP Server Service Remote Code Execution Vulnerability
MicrosoftWindows Distributed File System (DFS) CVE-2024-29066 Windows Distributed File System (DFS) Remote Code Execution Vulnerability
MicrosoftWindows Distributed File System (DFS) CVE-2024-26226 Windows Distributed File System (DFS) Information Disclosure Vulnerability
MicrosoftWindows DWM Core Library CVE-2024-26172 Windows DWM Core Library Information Disclosure Vulnerability
MicrosoftWindows File Server Resource Management Service CVE-2024-26216 Windows File Server Resource Management Service Elevation of Privilege Vulnerability
MicrosoftWindows HTTP.sys CVE-2024-26219 HTTP.sys Denial of Service Vulnerability
MicrosoftWindows Internet Connection Sharing (ICS) CVE-2024-26253 Windows rndismp6.sys Remote Code Execution Vulnerability
MicrosoftWindows Internet Connection Sharing (ICS) CVE-2024-26252 Windows rndismp6.sys Remote Code Execution Vulnerability
MicrosoftWindows Kerberos CVE-2024-26183 Windows Kerberos Denial of Service Vulnerability
MicrosoftWindows Kerberos CVE-2024-26248 Windows Kerberos Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-20693 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-26245 Windows SMB Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-26229 Windows CSC Service Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-26218 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Local Security Authority Subsystem Service (LSASS) CVE-2024-26209 Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
MicrosoftWindows Message Queuing CVE-2024-26232 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2024-26208 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Mobile Hotspot CVE-2024-26220 Windows Mobile Hotspot Information Disclosure Vulnerability
MicrosoftWindows Proxy Driver CVE-2024-26234 Proxy Driver Spoofing Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-28902 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-28900 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-28901 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-26255 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-26230 Windows Telephony Server Elevation of Privilege Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-26239 Windows Telephony Server Elevation of Privilege Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-26207 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-26217 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-26211 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2024-20678 Remote Procedure Call Runtime Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-26200 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-26179 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-26205 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Secure Boot CVE-2024-29061 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28921 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-20689 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26250 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28922 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-29062 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-20669 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28898 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-20688 Secure Boot Security Feature Bypass Vulnerability
LenovoWindows Secure Boot CVE-2024-23593 Lenovo: CVE-2024-23593 Zero Out Boot Manager and drop to UEFI Shell
MicrosoftWindows Secure Boot CVE-2024-28896 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28919 Secure Boot Security Feature Bypass Vulnerability
LenovoWindows Secure Boot CVE-2024-23594 Lenovo: CVE-2024-23594 Stack Buffer Overflow in LenovoBT.efi
MicrosoftWindows Secure Boot CVE-2024-28923 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28903 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26189 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26240 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28924 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28897 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28925 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26175 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28920 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26194 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26180 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26171 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26168 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Storage CVE-2024-29052 Windows Storage Elevation of Privilege Vulnerability
MicrosoftWindows Telephony Server CVE-2024-26242 Windows Telephony Server Elevation of Privilege Vulnerability
MicrosoftWindows Update Stack CVE-2024-26236 Windows Update Stack Elevation of Privilege Vulnerability
MicrosoftWindows Update Stack CVE-2024-26235 Windows Update Stack Elevation of Privilege Vulnerability
MicrosoftWindows USB Print Driver CVE-2024-26243 Windows USB Print Driver Elevation of Privilege Vulnerability
MicrosoftWindows Virtual Machine Bus CVE-2024-26254 Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability
MicrosoftWindows Win32K - ICOMP CVE-2024-26241 Win32k Elevation of Privilege Vulnerability

CVE-2024-3156 - Chromium: CVE-2024-3156 Inappropriate implementation in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-3156
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-3156 Inappropriate implementation in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 123.0.2420.81 4/4/2024 123.0.6312.105/.106/.107
Extended Stable 122.0.2365.120 4/4/2024 122.0.6261.156

Mitigations:
None
Workarounds:
None
Revision:
1.0    04-Apr-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-3156
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
123.0.2420.81 No None
Microsoft Edge (Chromium-based) Extended Stable Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
122.0.2365.120 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-3156 None

CVE-2024-3158 - Chromium: CVE-2024-3158 Use after free in Bookmarks

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-3158
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-3158 Use after free in Bookmarks
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 123.0.2420.81 4/4/2024 123.0.6312.105/.106/.107
Extended Stable 122.0.2365.120 4/4/2024 122.0.6261.156

Mitigations:
None
Workarounds:
None
Revision:
1.0    04-Apr-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-3158
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
123.0.2420.81 No None
Microsoft Edge (Chromium-based) Extended Stable Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
122.0.2365.120 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-3158 None

CVE-2024-3159 - Chromium: CVE-2024-3159 Out of bounds memory access in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-3159
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-3159 Out of bounds memory access in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 123.0.2420.81 4/4/2024 123.0.6312.105/.106/.107
Extended Stable 122.0.2365.120 4/4/2024 122.0.6261.156

Mitigations:
None
Workarounds:
None
Revision:
1.0    04-Apr-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-3159
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
123.0.2420.81 No None
Microsoft Edge (Chromium-based) Extended Stable Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
122.0.2365.120 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-3159 None

CVE-2024-20669 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20669
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to compromise admin credentials on the device.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20669
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20669

Zammis Clark


CVE-2024-20688 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20688
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20688
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20688 Azure Yang with Kunlun Lab


CVE-2024-20689 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20689
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20689
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20689 Azure Yang with Kunlun Lab


CVE-2024-21409 - .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21409
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this remote code execution vulnerability?

An authenticated attacker who successfully exploited a vulnerability in WordPad when closing a maliciously crafted .docx file could trigger execution of malicious code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21409
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 6.0 5037336 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.29 Maybe None
.NET 7.0 5037337 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
7.0.18 Maybe None
.NET 8.0 5037338 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.0.4 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1607 for 32-bit Systems 5036609 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1607 for x64-based Systems 5036609 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems 5037035 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems 5037035 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems 5037035 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems 5037036 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems 5037036 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems 5037036 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems 5037037 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems 5037037 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2016 5036609 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2016 (Server Core installation) 5036609 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 5037033 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) 5037033 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems 5037035 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems 5037035 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems 5037035 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems 5037036 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems 5037036 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems 5037036 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems 5037037 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems 5037037 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9206.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems 5036620 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems 5036620 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 5037033 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) 5037033 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 5037041 (Monthly Rollup)
5037128 (Security Only)
Important Remote Code Execution Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037041 (Monthly Rollup)
5037128 (Security Only)
Important Remote Code Execution Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 5037041 (Monthly Rollup)
5037128 (Security Only)
Important Remote Code Execution Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037041 (Monthly Rollup)
5037128 (Security Only)
Important Remote Code Execution Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037038 (Monthly Rollup)
5037127 (Security Only)
Important Remote Code Execution Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037038 (Monthly Rollup)
5037127 (Security Only)
Important Remote Code Execution Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 5037039 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) 5037039 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 5037040 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) 5037040 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037127 (Security Only) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037127 (Security Only) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 5037039 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) 5037039 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 5037040 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) 5037040 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.4.18 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.6.14 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.9 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.9.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21409 wh1tc & Zhiniang Peng


CVE-2024-21424 - Azure Compute Gallery Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21424
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Compute Gallery Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain specific limited administrator privileges.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability?

An authenticated attacker with Read permissions to an Azure Compute Gallery Virtual Machine (VM) deployment could replicate the disk into another VM and view the data it contains. However, they cannot remove or delete the disk from the targeted VM, nor can they alter the disk's data.


What actions do customers need to take to protect themselves from this vulnerability?

The vulnerability has been mitigated by the latest change to the Azure Compute Gallery (ACG) image creation permission requirements. Traditionally, read access on the Virtual Machine and disks/snapshots were required to import the VM/disk into an ACG image. To enhance the security posture and ensure that permissions are granted accurately at the appropriate access level during Virtual Machine Image creation in ACG, customers will be required to have write access on the source Virtual Machine and disks/snapshots/blobs.

For information on how to update permissions, see What RBAC Permissions are required to create an ACG Image.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21424
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Compute Gallery More Information (Security Update) Important Elevation of Privilege None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21424 Anonymous


CVE-2024-26250 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26250
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26250
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26250 Zammis Clark


CVE-2024-26252 - Windows rndismp6.sys Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26252
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows rndismp6.sys Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

An unauthenticated attacker needs to physically connect a specially crafted USB device to exploit this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26252
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26252 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-26253 - Windows rndismp6.sys Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26253
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows rndismp6.sys Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

An unauthenticated attacker needs to physically connect a specially crafted USB device to exploit this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26253
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26253 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-26254 - Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26254
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26254
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Denial of Service 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Denial of Service 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Denial of Service 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Denial of Service
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Denial of Service
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Denial of Service
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Denial of Service 5035854 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Denial of Service 5035854 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2019 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Denial of Service 5035857 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Denial of Service 5035857 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Denial of Service 5035856 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26254

Simon Xiao with Microsoft


Xiaobo Wang with Microsoft


CVE-2024-26255 - Windows Remote Access Connection Manager Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26255
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26255
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2019 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Information Disclosure 5035856 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26255 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2024-26256 - libarchive Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26256
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: libarchive Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26256
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26256 Terrynini with DEVCORE


CVE-2024-26172 - Windows DWM Core Library Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26172
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DWM Core Library Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26172
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2019 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Information Disclosure 5035856 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26172 He YiSheng, Zhang WangJunJie with Hillstone Network Security Research Institute


CVE-2024-26179 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26179
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26179
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26179 Anonymous


CVE-2024-26200 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26200
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26200
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26200 Anonymous


CVE-2024-26205 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26205
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26205
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26205 Anonymous


CVE-2024-26158 - Microsoft Install Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26158
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Install Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26158
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26158 Simon Zuckerbraun of Trend Micro Zero Day Initiative


CVE-2024-26232 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26232
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


How could an attacker exploit this vulnerability?

Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.


Mitigations:

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:

The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel.

You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine.


Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26232
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C