Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
Microsoft.NET and Visual Studio CVE-2024-21409 .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
MicrosoftAzure CVE-2024-29993 Azure CycleCloud Elevation of Privilege Vulnerability
MicrosoftAzure AI Search CVE-2024-29063 Azure AI Search Information Disclosure Vulnerability
MicrosoftAzure Arc CVE-2024-28917 Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability
MicrosoftAzure Compute Gallery CVE-2024-21424 Azure Compute Gallery Elevation of Privilege Vulnerability
MicrosoftAzure Migrate CVE-2024-26193 Azure Migrate Remote Code Execution Vulnerability
MicrosoftAzure Monitor CVE-2024-29989 Azure Monitor Agent Elevation of Privilege Vulnerability
MicrosoftAzure Private 5G Core CVE-2024-20685 Azure Private 5G Core Denial of Service Vulnerability
MicrosoftAzure SDK CVE-2024-29992 Azure Identity Library for .NET Information Disclosure Vulnerability
Intel CorporationIntel CVE-2024-2201 Intel: CVE-2024-2201 Branch History Injection
MicrosoftInternet Shortcut Files CVE-2024-29988 SmartScreen Prompt Security Feature Bypass Vulnerability
secalert@redhat.comMariner CVE-2019-3816 Unknown
secalert@redhat.comMariner CVE-2019-3833 Unknown
MicrosoftMicrosoft Azure Kubernetes Service CVE-2024-29990 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
MicrosoftMicrosoft Brokering File System CVE-2024-28905 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Brokering File System CVE-2024-28907 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Brokering File System CVE-2024-26213 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Brokering File System CVE-2024-28904 Microsoft Brokering File System Elevation of Privilege Vulnerability
MicrosoftMicrosoft Defender for IoT CVE-2024-29055 Microsoft Defender for IoT Elevation of Privilege Vulnerability
MicrosoftMicrosoft Defender for IoT CVE-2024-29053 Microsoft Defender for IoT Remote Code Execution Vulnerability
MicrosoftMicrosoft Defender for IoT CVE-2024-29054 Microsoft Defender for IoT Elevation of Privilege Vulnerability
MicrosoftMicrosoft Defender for IoT CVE-2024-21324 Microsoft Defender for IoT Elevation of Privilege Vulnerability
MicrosoftMicrosoft Defender for IoT CVE-2024-21323 Microsoft Defender for IoT Remote Code Execution Vulnerability
MicrosoftMicrosoft Defender for IoT CVE-2024-21322 Microsoft Defender for IoT Remote Code Execution Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-3156 Chromium: CVE-2024-3156 Inappropriate implementation in V8
MicrosoftMicrosoft Edge (Chromium-based) CVE-2024-29049 Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
MicrosoftMicrosoft Edge (Chromium-based) CVE-2024-29981 Microsoft Edge (Chromium-based) Spoofing Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-3159 Chromium: CVE-2024-3159 Out of bounds memory access in V8
ChromeMicrosoft Edge (Chromium-based) CVE-2024-3158 Chromium: CVE-2024-3158 Use after free in Bookmarks
MicrosoftMicrosoft Install Service CVE-2024-26158 Microsoft Install Service Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office Excel CVE-2024-26257 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Outlook CVE-2024-20670 Outlook for Windows Spoofing Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2024-26251 Microsoft SharePoint Server Spoofing Vulnerability
MicrosoftMicrosoft WDAC ODBC Driver CVE-2024-26214 Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-26244 Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-26210 Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26233 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26231 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26227 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26223 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26221 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26224 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: DNS Server CVE-2024-26222 Windows DNS Server Remote Code Execution Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2024-29064 Windows Hyper-V Denial of Service Vulnerability
MicrosoftSQL Server CVE-2024-28937 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28938 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29044 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28935 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28940 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28943 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28941 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28910 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28944 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28908 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28909 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29985 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28906 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28926 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28933 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28934 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28927 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28930 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29046 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28932 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29047 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28931 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29984 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28929 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28939 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28942 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29043 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28936 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29045 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28915 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28913 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28945 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29048 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28912 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28914 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29983 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-28911 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftSQL Server CVE-2024-29982 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
MicrosoftWindows Authentication Methods CVE-2024-29056 Windows Authentication Elevation of Privilege Vulnerability
MicrosoftWindows Authentication Methods CVE-2024-21447 Windows Authentication Elevation of Privilege Vulnerability
MicrosoftWindows BitLocker CVE-2024-20665 BitLocker Security Feature Bypass Vulnerability
MicrosoftWindows Compressed Folder CVE-2024-26256 libarchive Remote Code Execution Vulnerability
MicrosoftWindows Cryptographic Services CVE-2024-26228 Windows Cryptographic Services Security Feature Bypass Vulnerability
MicrosoftWindows Cryptographic Services CVE-2024-29050 Windows Cryptographic Services Remote Code Execution Vulnerability
MicrosoftWindows Defender Credential Guard CVE-2024-26237 Windows Defender Credential Guard Elevation of Privilege Vulnerability
MicrosoftWindows DHCP Server CVE-2024-26212 DHCP Server Service Denial of Service Vulnerability
MicrosoftWindows DHCP Server CVE-2024-26215 DHCP Server Service Denial of Service Vulnerability
MicrosoftWindows DHCP Server CVE-2024-26195 DHCP Server Service Remote Code Execution Vulnerability
MicrosoftWindows DHCP Server CVE-2024-26202 DHCP Server Service Remote Code Execution Vulnerability
MicrosoftWindows Distributed File System (DFS) CVE-2024-29066 Windows Distributed File System (DFS) Remote Code Execution Vulnerability
MicrosoftWindows Distributed File System (DFS) CVE-2024-26226 Windows Distributed File System (DFS) Information Disclosure Vulnerability
MicrosoftWindows DWM Core Library CVE-2024-26172 Windows DWM Core Library Information Disclosure Vulnerability
MicrosoftWindows File Server Resource Management Service CVE-2024-26216 Windows File Server Resource Management Service Elevation of Privilege Vulnerability
MicrosoftWindows HTTP.sys CVE-2024-26219 HTTP.sys Denial of Service Vulnerability
MicrosoftWindows Internet Connection Sharing (ICS) CVE-2024-26253 Windows rndismp6.sys Remote Code Execution Vulnerability
MicrosoftWindows Internet Connection Sharing (ICS) CVE-2024-26252 Windows rndismp6.sys Remote Code Execution Vulnerability
MicrosoftWindows Kerberos CVE-2024-26183 Windows Kerberos Denial of Service Vulnerability
MicrosoftWindows Kerberos CVE-2024-26248 Windows Kerberos Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-20693 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-26245 Windows SMB Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-26229 Windows CSC Service Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-26218 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Local Security Authority Subsystem Service (LSASS) CVE-2024-26209 Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
MicrosoftWindows Message Queuing CVE-2024-26232 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Message Queuing CVE-2024-26208 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
MicrosoftWindows Mobile Hotspot CVE-2024-26220 Windows Mobile Hotspot Information Disclosure Vulnerability
MicrosoftWindows Proxy Driver CVE-2024-26234 Proxy Driver Spoofing Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-28902 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-28900 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-28901 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-26255 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-26230 Windows Telephony Server Elevation of Privilege Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-26239 Windows Telephony Server Elevation of Privilege Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-26207 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-26217 Windows Remote Access Connection Manager Information Disclosure Vulnerability
MicrosoftWindows Remote Access Connection Manager CVE-2024-26211 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
MicrosoftWindows Remote Procedure Call CVE-2024-20678 Remote Procedure Call Runtime Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-26200 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-26179 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-26205 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Secure Boot CVE-2024-29061 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28921 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-20689 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26250 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28922 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-29062 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-20669 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28898 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-20688 Secure Boot Security Feature Bypass Vulnerability
LenovoWindows Secure Boot CVE-2024-23593 Lenovo: CVE-2024-23593 Zero Out Boot Manager and drop to UEFI Shell
MicrosoftWindows Secure Boot CVE-2024-28896 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28919 Secure Boot Security Feature Bypass Vulnerability
LenovoWindows Secure Boot CVE-2024-23594 Lenovo: CVE-2024-23594 Stack Buffer Overflow in LenovoBT.efi
MicrosoftWindows Secure Boot CVE-2024-28923 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28903 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26189 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26240 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28924 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28897 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28925 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26175 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-28920 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26194 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26180 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26171 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Secure Boot CVE-2024-26168 Secure Boot Security Feature Bypass Vulnerability
MicrosoftWindows Storage CVE-2024-29052 Windows Storage Elevation of Privilege Vulnerability
MicrosoftWindows Telephony Server CVE-2024-26242 Windows Telephony Server Elevation of Privilege Vulnerability
MicrosoftWindows Update Stack CVE-2024-26236 Windows Update Stack Elevation of Privilege Vulnerability
MicrosoftWindows Update Stack CVE-2024-26235 Windows Update Stack Elevation of Privilege Vulnerability
MicrosoftWindows USB Print Driver CVE-2024-26243 Windows USB Print Driver Elevation of Privilege Vulnerability
MicrosoftWindows Virtual Machine Bus CVE-2024-26254 Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability
MicrosoftWindows Win32K - ICOMP CVE-2024-26241 Win32k Elevation of Privilege Vulnerability

CVE-2024-3156 - Chromium: CVE-2024-3156 Inappropriate implementation in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-3156
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-3156 Inappropriate implementation in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 123.0.2420.81 4/4/2024 123.0.6312.105/.106/.107
Extended Stable 122.0.2365.120 4/4/2024 122.0.6261.156

Mitigations:
None
Workarounds:
None
Revision:
1.0    04-Apr-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-3156
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
123.0.2420.81 No None
Microsoft Edge (Chromium-based) Extended Stable Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
122.0.2365.120 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-3156 None

CVE-2024-3158 - Chromium: CVE-2024-3158 Use after free in Bookmarks

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-3158
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-3158 Use after free in Bookmarks
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 123.0.2420.81 4/4/2024 123.0.6312.105/.106/.107
Extended Stable 122.0.2365.120 4/4/2024 122.0.6261.156

Mitigations:
None
Workarounds:
None
Revision:
1.0    04-Apr-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-3158
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
123.0.2420.81 No None
Microsoft Edge (Chromium-based) Extended Stable Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
122.0.2365.120 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-3158 None

CVE-2024-3159 - Chromium: CVE-2024-3159 Out of bounds memory access in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-3159
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-3159 Out of bounds memory access in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 123.0.2420.81 4/4/2024 123.0.6312.105/.106/.107
Extended Stable 122.0.2365.120 4/4/2024 122.0.6261.156

Mitigations:
None
Workarounds:
None
Revision:
1.0    04-Apr-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-3159
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
123.0.2420.81 No None
Microsoft Edge (Chromium-based) Extended Stable Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
122.0.2365.120 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-3159 None

CVE-2024-20669 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20669
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to compromise admin credentials on the device.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20669
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20669

Zammis Clark


CVE-2024-20688 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20688
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20688
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20688 Azure Yang with Kunlun Lab


CVE-2024-20689 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20689
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20689
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20689 Azure Yang with Kunlun Lab


CVE-2024-21409 - .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21409
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this remote code execution vulnerability?

An authenticated attacker who successfully exploited a vulnerability in WordPad when closing a maliciously crafted .docx file could trigger execution of malicious code.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21409
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 6.0 5037336 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.29 Maybe None
.NET 7.0 5037337 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
7.0.18 Maybe None
.NET 8.0 5037338 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.0.4 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for 32-bit Systems 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for ARM64-based Systems 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows 10 Version 1809 for x64-based Systems 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.7.2 on Windows Server 2019 (Server Core installation) 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1607 for 32-bit Systems 5036609 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1607 for x64-based Systems 5036609 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for 32-bit Systems 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 1809 for x64-based Systems 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for 32-bit Systems 5037035 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for ARM64-based Systems 5037035 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 21H2 for x64-based Systems 5037035 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for 32-bit Systems 5037036 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for ARM64-based Systems 5037036 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 10 Version 22H2 for x64-based Systems 5037036 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for ARM64-based Systems 5037037 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows 11 version 21H2 for x64-based Systems 5037037 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2016 5036609 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2016 (Server Core installation) 5036609 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2019 (Server Core installation) 5037034 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 5037033 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8 on Windows Server 2022 (Server Core installation) 5037033 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for 32-bit Systems 5037035 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for ARM64-based Systems 5037035 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 21H2 for x64-based Systems 5037035 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for 32-bit Systems 5037036 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for ARM64-based Systems 5037036 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 10 Version 22H2 for x64-based Systems 5037036 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for ARM64-based Systems 5037037 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 version 21H2 for x64-based Systems 5037037 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9206.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for ARM64-based Systems 5036620 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows 11 Version 22H2 for x64-based Systems 5036620 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 5037033 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 3.5 AND 4.8.1 on Windows Server 2022 (Server Core installation) 5037033 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.9236.0 Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 5037041 (Monthly Rollup)
5037128 (Security Only)
Important Remote Code Execution Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5037041 (Monthly Rollup)
5037128 (Security Only)
Important Remote Code Execution Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 5037041 (Monthly Rollup)
5037128 (Security Only)
Important Remote Code Execution Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2 on Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5037041 (Monthly Rollup)
5037128 (Security Only)
Important Remote Code Execution Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037038 (Monthly Rollup)
5037127 (Security Only)
Important Remote Code Execution Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037038 (Monthly Rollup)
5037127 (Security Only)
Important Remote Code Execution Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 5037039 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 (Server Core installation) 5037039 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 5037040 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 on Windows Server 2012 R2 (Server Core installation) 5037040 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.7.4092.0 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 5037127 (Security Only) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5037127 (Security Only) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 5037039 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 (Server Core installation) 5037039 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 5037040 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft .NET Framework 4.8 on Windows Server 2012 R2 (Server Core installation) 5037040 (Monthly Rollup) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
4.8.4718.0 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.4.18 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.6.14 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.9 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.9.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21409 wh1tc & Zhiniang Peng


CVE-2024-21424 - Azure Compute Gallery Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21424
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Compute Gallery Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain specific limited administrator privileges.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability?

An authenticated attacker with Read permissions to an Azure Compute Gallery Virtual Machine (VM) deployment could replicate the disk into another VM and view the data it contains. However, they cannot remove or delete the disk from the targeted VM, nor can they alter the disk's data.


What actions do customers need to take to protect themselves from this vulnerability?

The vulnerability has been mitigated by the latest change to the Azure Compute Gallery (ACG) image creation permission requirements. Traditionally, read access on the Virtual Machine and disks/snapshots were required to import the VM/disk into an ACG image. To enhance the security posture and ensure that permissions are granted accurately at the appropriate access level during Virtual Machine Image creation in ACG, customers will be required to have write access on the source Virtual Machine and disks/snapshots/blobs.

For information on how to update permissions, see What RBAC Permissions are required to create an ACG Image.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21424
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Compute Gallery More Information (Security Update) Important Elevation of Privilege None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Unknown No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21424 Anonymous


CVE-2024-26250 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26250
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26250
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26250 Zammis Clark


CVE-2024-26252 - Windows rndismp6.sys Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26252
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows rndismp6.sys Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

An unauthenticated attacker needs to physically connect a specially crafted USB device to exploit this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26252
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26252 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-26253 - Windows rndismp6.sys Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26253
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows rndismp6.sys Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

An unauthenticated attacker needs to physically connect a specially crafted USB device to exploit this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26253
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26253 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-26254 - Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26254
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26254
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Denial of Service 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Denial of Service 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Denial of Service 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Denial of Service
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Denial of Service
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Denial of Service
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Denial of Service 5035854 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Denial of Service 5035854 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2019 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Denial of Service 5035857 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Denial of Service 5035857 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Denial of Service 5035856 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26254

Simon Xiao with Microsoft


Xiaobo Wang with Microsoft


CVE-2024-26255 - Windows Remote Access Connection Manager Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26255
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26255
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2019 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Information Disclosure 5035856 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26255 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2024-26256 - libarchive Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26256
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: libarchive Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26256
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26256 Terrynini with DEVCORE


CVE-2024-26172 - Windows DWM Core Library Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26172
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DWM Core Library Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26172
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2019 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Information Disclosure 5035856 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26172 He YiSheng, Zhang WangJunJie with Hillstone Network Security Research Institute


CVE-2024-26179 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26179
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26179
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26179 Anonymous


CVE-2024-26200 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26200
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26200
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26200 Anonymous


CVE-2024-26205 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26205
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26205
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26205 Anonymous


CVE-2024-26158 - Microsoft Install Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26158
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Install Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26158
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26158 Simon Zuckerbraun of Trend Micro Zero Day Initiative


CVE-2024-26232 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26232
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


How could an attacker exploit this vulnerability?

Successful exploitation of this vulnerability could allow an authenticated domain user to remotely execute code on the target server. The attacker needs to convince a user on the target machine to connect to a malicious server or compromise a legitimate MSMQ server host and make it run as a malicious server.


Mitigations:

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:

The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel.

You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine.


Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26232
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26232 Yuki Chen with Cyber KunLun


CVE-2024-28920 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28920
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28920
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28920 Anonymous


CVE-2024-28922 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28922
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.1/TemporalScore:3.6
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28922
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:P/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28922 Zammis Clark


CVE-2024-28921 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28921
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28921
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28921 Zammis Clark


CVE-2024-28919 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28919
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28919
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28919 Zammis Clark


CVE-2024-28923 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28923
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.4/TemporalScore:5.6
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28923
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28923 Meir Bloya


Meir Bloya


CVE-2024-28896 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28896
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28896
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28896 Azure Yang with Kunlun Lab


CVE-2024-28898 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28898
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.3/TemporalScore:5.5
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


How could an attacker successfully exploit this vulnerability?

To exploit the vulnerability, an attacker who has physical access or Administrative rights to a target device could install a malicious .bcd file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28898
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.3
Temporal: 5.5
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28898 Azure Yang with Kunlun Lab


CVE-2024-28901 - Windows Remote Access Connection Manager Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28901
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28901
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Information Disclosure 5035856 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28901 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2024-28902 - Windows Remote Access Connection Manager Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28902
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28902
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Information Disclosure 5035856 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28902 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2024-28903 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28903
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28903
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28903 Pete Batard with Akeo Consulting


CVE-2024-28905 - Microsoft Brokering File System Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28905
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires multiple conditions to be met, such as specific application behavior, user actions, manipulation of parameters passed to a function, and impersonation of an integrity level token.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability would gain the ability to escape the AppContainer and impersonate a non-AppContainer token.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28905
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28905 Naceri with MSRC Vulnerabilities & Mitigations


CVE-2024-28906 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28906
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28906
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28906 Anonymous


CVE-2024-28908 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28908
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28908
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28908 Anonymous


CVE-2024-28909 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28909
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28909
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28909 Anonymous


CVE-2024-28910 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28910
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28910
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28910 Anonymous


CVE-2024-28911 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28911
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28911
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28911 Anonymous


CVE-2024-28912 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28912
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28912
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28912 Anonymous


CVE-2024-28913 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28913
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28913
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28913 Anonymous


CVE-2024-28914 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28914
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28914
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28914 Anonymous


CVE-2024-28915 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28915
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28915
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28915 Anonymous


CVE-2024-28929 - Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28929
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28929
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows 5037570 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows 5037571 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.35 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.4.18 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.6.14 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.9 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.9.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28929 Anonymous


CVE-2024-28931 - Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28931
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28931
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows 5037570 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows 5037571 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.35 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.4.18 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.6.14 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.9 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.9.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28931 Yuki Chen with Cyber KunLun


CVE-2024-28932 - Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28932
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28932
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows 5037570 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows 5037571 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.35 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.4.18 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.6.14 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.9 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.9.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28932 Yuki Chen with Cyber KunLun


CVE-2024-28936 - Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28936
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28936
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows 5037570 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows 5037571 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.35 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.4.18 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.6.14 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.9 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.9.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28936 Anonymous


CVE-2024-28939 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28939
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28939
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28939 Anonymous


CVE-2024-28942 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28942
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28942
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28942 Anonymous


CVE-2024-28945 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28945
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28945
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28945 Anonymous


CVE-2024-29043 - Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29043
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29043
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows 5037570 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows 5037571 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29043 Anonymous


CVE-2024-29045 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29045
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29045
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29045 Anonymous


CVE-2024-29047 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29047
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29047
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29047 Sam Pope with MSRC Vulnerabilities & Mitigations


Anonymous


CVE-2024-29050 - Windows Cryptographic Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29050
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cryptographic Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

For successful exploitation, a malicious certificate needs to be imported on an affected system. An attacker could upload a certificate to a service that processes or imports certificates, or an attacker could convince an authenticated user to import a certificate on their system.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29050
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29050 VictorV(Tang tianwen) with Kunlun Lab


Erik Egsgard with Field Effect Software


CVE-2024-29063 - Azure AI Search Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29063
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure AI Search Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.6
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityLow
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could obtain sensitive API Keys.


What actions do customers need to take to protect themselves from this vulnerability?

The vulnerability has been mitigated by a recent update to Azure AI Search's backend infrastructure. Customers who are required to rotate specific credentials have been notified through Azure Service Health Alerts under TrackingID: WL1G-3TZ. See here for information on how to view Azure Service Health Alerts in the Azure Portal.

Customers who did not receive this Azure Service Health Alert do not need to take any action to be protected against this vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29063
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure AI Search Release Notes (Security Update) Important Information Disclosure None Base: 7.3
Temporal: 6.6
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L/E:P/RL:O/RC:C
Unknown No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29063 Anonymous


CVE-2024-29064 - Windows Hyper-V Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29064
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.2/TemporalScore:5.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29064
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5036925 (Security Update) Important Denial of Service 5035858 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Denial of Service 5035855 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Denial of Service 5035849 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Denial of Service 5035845
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Denial of Service
5035845
Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Denial of Service 5035854 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Denial of Service 5035854 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2016 5036899 (Security Update) Important Denial of Service 5035855 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Denial of Service 5035855 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Denial of Service 5035849 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Denial of Service 5035849 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Denial of Service 5035857 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Denial of Service 5035857 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Denial of Service 5035856 Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29064 HongZhenhao with TianGong Team of Legendsec at Qi'anxin Group


CVE-2024-29066 - Windows Distributed File System (DFS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29066
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Distributed File System (DFS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit a DFS namespace (non-default) out-of-bound write vulnerability that results in heap corruption, which could then be used to perform arbitrary code execution on the server's dfssvc.exe process which runs as SYSTEM user.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29066
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29066 3wyeye5 with OSR


CVE-2024-20685 - Azure Private 5G Core Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20685
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Private 5G Core Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.2
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires multiple conditions to be met, such as specific application behavior, user actions, manipulation of parameters passed to a function, and impersonation of an integrity level token.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Moderate Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20685
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Private 5G Core Release Notes (Security Update) Moderate Denial of Service None Base: 5.9
Temporal: 5.2
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
2403.0-2 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20685 Salim S.I, Richard Y Lin, Atlas Huang (CTOne/TrendMicro) with Trend Micro Zero Day Initiative


CVE-2024-29981 - Microsoft Edge (Chromium-based) Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29981
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (Chromium-based) Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Why is the severity for this CVE rated as Moderate, but the CVSS score is higher than normal?

Per our severity guidelines, the amount of user interaction or preconditions required to allow this sort of exploitation downgraded the severity, specifically it says, "If a bug requires more than a click, a key press, or several preconditions, the severity will be downgraded". The CVSS scoring system doesn't allow for this type of nuance.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could cover and spoof elements of the UI. The modified information is only visual.


Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 123.0.2420.81 4/4/2024 123.0.6312.105/.106/.107
Extended Stable 122.0.2365.120 4/4/2024 122.0.6261.156

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    04-Apr-24    

Information published.


Low Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29981
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Low Spoofing None Base: 4.3
Temporal: 3.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
123.0.2420.81 No None
Microsoft Edge (Chromium-based) Extended Stable Release Notes (Security Update) Low Spoofing None Base: N/A
Temporal: N/A
Vector: N/A
122.0.2365.120 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29981 Hafiizh with https://www.linkedin.com/in/hafiizh-7aa6bb31/


CVE-2024-23594 - Lenovo: CVE-2024-23594 Stack Buffer Overflow in LenovoBT.efi

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-23594
MITRE
NVD

Issuing CNA: Lenovo

CVE Title: Lenovo: CVE-2024-23594 Stack Buffer Overflow in LenovoBT.efi
CVSS:

CVSS:3.1 Highest BaseScore:6.4/TemporalScore:5.6
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Why is this Lenovo CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in certain Lenovo bootloaders. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the vulnerability.

Please see the following for more information:


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-23594
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.4
Temporal: 5.6
Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-23594 None

CVE-2024-29988 - SmartScreen Prompt Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29988
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: SmartScreen Prompt Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.2
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user needs to be tricked into running malicious files.


How could an attacker exploit this vulnerability?

To exploit this security feature bypass vulnerability, an attacker would need to convince a user to launch malicious files using a launcher application that requests that no UI be shown.


How could an attacker exploit the vulnerability?

In an email or instant message attack scenario, the attacker could send the targeted user a specially crafted file that is designed to exploit the remote code execution vulnerability.

In any case an attacker would have no way to force a user to view attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could entice a user to either click a link that directs the user to the attacker's site or send a malicious attachment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29988
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29988 Dmitrij Lenz and Vlad Stolyarov of Google's Threat Analysis Group


Peter Girnus (gothburz) of Trend Micro's Zero Day Initiative with Trend Micro


CVE-2024-29990 - Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29990
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.0/TemporalScore:8.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


Is there any action I need to take to be protected from this vulnerability?

Customer must ensure they are running the latest version of az confcom and Kata Image.

Customers who do not have az confcom installed can install the latest version by executing az extension add -n confcom. Customers who are running versions prior to 0.3.3 need to update by executing az extension update -n confcom. For more information, reference:


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An attacker who successfully exploited this vulnerability could steal credentials and affect resources beyond the security scope managed by Azure Kubernetes Service Confidential Containers (AKSCC).


How could an attacker exploit this vulnerability?

An attacker can access the untrusted AKS Kubernetes node and AKS Confidential Container to take over confidential guests and containers beyond the network stack it might be bound to.


According to the CVSS metric, privileges required is none (PR:N). Does the attacker need to be authenticated?

No. An unauthenticated attacker can move the same workload onto a machine they control, where the attacker is root.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29990
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Kubernetes Service Confidential Containers Release Notes (Security Update) Important Elevation of Privilege None Base: 9.0
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C
0.3.4 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29990 Yuval Avrahami


CVE-2024-2201 - Intel: CVE-2024-2201 Branch History Injection

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-2201
MITRE
NVD

Issuing CNA: Intel Corporation

CVE Title: Intel: CVE-2024-2201 Branch History Injection
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

This CVE was assigned by Intel. Please see CVE-2024-2201 on CVE.org for more information.


FAQ:

Why is this Intel CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in certain processor models offered by Intel. The mitigation for this vulnerability is disabled by default and manual action is required for customers to be protected. This CVE is being documented in the Security Update Guide to inform customers of the available mitigation and its potential performance impact.

Please see the following for more information:

What steps are required to protect my system against the vulnerability?

We are providing the following registry information to enable the mitigations for this CVE.

Important: This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry see How to back up and restore the registry in Windows.

To enable the mitigation for CVE-2024-2201 on Windows devices and clients using Intel Processors:

  • reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverride /t REG_DWORD /d 0x00800000 /f

  • reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management" /v FeatureSettingsOverrideMask /t REG_DWORD /d 0x00000003 /f

Customers who wish to implement the mitigation within their systems can also refer to the following for more information.

To enable the mitigation for CVE-2024-2201 on Linux devices and clients using Intel Processors:

Can I expect any performance impact after I configure the registry keys?

In some cases, installing these updates will have a performance impact. In testing Microsoft has seen some performance impact with this mitigation. Microsoft values the security of its software and services but made the decision to allow users and administrators to evaluate the performance impact and risk exposure before deciding to enable the mitigation.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-2201
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Information Disclosure 5035920
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Information Disclosure 5035920
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Information Disclosure 5035920
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Information Disclosure 5035920
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Information Disclosure 5035888
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Information Disclosure 5035888
Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Information Disclosure 5035930 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Information Disclosure 5035930 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Information Disclosure 5035855 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Information Disclosure 5035855 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Information Disclosure 5035849 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Information Disclosure 5035849 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Information Disclosure 5035857 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Information Disclosure 5035857 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Information Disclosure 5035856 Base: 4.7
Temporal: 4.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-2201

Will Dormann CERT/CC


CVE-2024-20678 - Remote Procedure Call Runtime Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20678
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated user could trigger this vulnerability. It does not require admin or other elevated privileges.


What is RPC runtime?

See Remote procedure call (RPC) for more information on RPC and RPC Runtime.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an authenticated attacker would need to send a specially crafted RPC call to an RPC host. This could result in remote code execution on the server side with the same permissions as the RPC service.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20678
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20678 Microsoft Offensive Research & Security Engineering with Microsoft


CVE-2024-20665 - BitLocker Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20665
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: BitLocker Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.1/TemporalScore:5.3
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredHigh
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to compromise admin credentials on the device.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20665
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.1
Temporal: 5.3
Vector: CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20665 Zammis Clark




CVE-2024-20693 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20693
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20693
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2016 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20693 Thijs Alkemade with Computest Sector 7


Khaled Nassar with Computest Sector 7


Daan Keuper with Computest Sector 7


CVE-2024-21322 - Microsoft Defender for IoT Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21322
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Defender for IoT Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the attacker to be an administrator of the web application. As is best practice, regular validation and audits of administrative groups should be conducted.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21322
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Defender for IoT Release Notes (Security Update) Critical Remote Code Execution None Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
24.1.3 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21322 Siemens Energy


CVE-2024-21323 - Microsoft Defender for IoT Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21323
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Defender for IoT Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the attacker to be able to send a malicious update package to the Defender for IoT sensor over the network. To do this, the attacker would first need to authenticate themselves and gain the necessary permissions to initiate the update process.


How could an attacker exploit this vulnerability?

Successful exploitation of this path traversal vulnerability would require an attacker to send a tar file to the Defender for IoT sensor. After the extraction process completed, the attacker could then send unsigned update packages and overwrite any file they chose.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21323
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Defender for IoT Release Notes (Security Update) Critical Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
24.1.3 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21323 Siemens Energy


CVE-2024-21324 - Microsoft Defender for IoT Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21324
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Defender for IoT Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain access to the credentials of other users on the system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21324
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Defender for IoT Release Notes (Security Update) Important Elevation of Privilege None Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
24.1.3 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21324 Siemens Energy


CVE-2024-21447 - Windows Authentication Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21447
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Authentication Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21447
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21447 Filip Dragović


CVE-2024-26193 - Azure Migrate Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26193
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Migrate Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.4/TemporalScore:5.9
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is Adjacent (AV:A), the attack complexity is high (AC:H) and the privileges required is high (PR:H). What does this mean for this vulnerability?

An authenticated attacker would need to have access to a proxy server created in the same or in an accessible network of the Appliance.


What actions do customers need to take to protect themselves from this vulnerability?

The vulnerability has been mitigated by the latest change to the Azure Migrate Appliance's AutoUpdater which ensures MSI installers downloaded from the Download Center have been authentically signed by Microsoft prior to installation. See here for information on how to ensure your Azure Migrate Appliance can get the latest Azure Migrate Agent and ConfigManager updates.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26193
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Migrate More Information (Security Update) Important Remote Code Execution None Base: 6.4
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.294.1003 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26193 Oran Moyal


CVE-2024-26168 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26168
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26168
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26168 Zammis Clark


CVE-2024-26171 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26171
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26171
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26171 Microsoft Offensive Research & Security Engineering


Azure Yang with Kunlun Lab


CVE-2024-26175 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26175
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26175
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26175 Meir Bloya


Meir Bloya


Azure Yang with Kunlun Lab


Azure Yang with Kunlun Lab


CVE-2024-26180 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26180
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26180
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26180 Azure Yang with Kunlun Lab


CVE-2024-26183 - Windows Kerberos Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26183
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kerberos Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26183
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Denial of Service 5035858 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Denial of Service 5035858 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Denial of Service 5035855 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Denial of Service 5035855 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Denial of Service 5035849 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Denial of Service 5035849 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Denial of Service 5035849 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Denial of Service 5035845
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Denial of Service 5035845
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Denial of Service 5035845
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Denial of Service
5035845
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Denial of Service
5035845
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Denial of Service
5035845
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Denial of Service 5035854 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Denial of Service 5035854 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Denial of Service 5035920
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Denial of Service 5035920
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Denial of Service 5035920
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Denial of Service 5035920
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Denial of Service 5035888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Denial of Service 5035888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Denial of Service 5035930 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Denial of Service 5035930 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Denial of Service 5035885 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Denial of Service 5035885 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Denial of Service 5035855 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Denial of Service 5035855 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Denial of Service 5035849 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Denial of Service 5035849 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Denial of Service 5035857 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Denial of Service 5035857 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26183 Hugo VINCENT with Synacktiv


CVE-2024-26189 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26189
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


How could an attacker successfully exploit this vulnerability?

To exploit the vulnerability, an attacker who has physical access or Administrative rights to a target device could install a malicious .bcd file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26189
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26189 Azure Yang with Kunlun Lab


CVE-2024-26194 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26194
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26194
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Security Feature Bypass 5035888
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Security Feature Bypass 5035888
Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 7.4
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26194 Microsoft Offensive Research & Security Engineering


CVE-2024-26195 - DHCP Server Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26195
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DHCP Server Service Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26195
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26195 luckyu with NorthSea


wkai with Codesafe Team of Legendsec at QI-ANXIN Group


CVE-2024-26202 - DHCP Server Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26202
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DHCP Server Service Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the attacker or targeted user to have specific elevated privileges. As is best practice, regular validation and audits of administrative groups should be conducted.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26202
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26202 luckyu with NorthSea


CVE-2024-26209 - Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26209
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26209
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Information Disclosure 5035856 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26209 Evan McBroom


CVE-2024-26218 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26218
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26218
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26218 gabe_k


CVE-2024-26219 - HTTP.sys Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26219
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: HTTP.sys Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26219
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Denial of Service 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Denial of Service 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Denial of Service 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Denial of Service
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Denial of Service
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Denial of Service
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Denial of Service 5035854 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Denial of Service 5035854 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Denial of Service 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2019 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Denial of Service 5035857 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Denial of Service 5035857 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Denial of Service 5035856 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26219 Aman Jain <amanjain@microsoft.com>, Steve Johnson <stevejohnson@microsoft.com>


CVE-2024-26220 - Windows Mobile Hotspot Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26220
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Hotspot Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.0/TemporalScore:4.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires a user to first turn on the Mobile Hotspot before the attacker starts the exploitation.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authorized attacker with guest/low privileges must first gain access to the local system, then wait for or trick the user into turning on the Mobile Hotspot feature.

Only when the Mobile Hotspot is turned on does the vulnerability become exploitable. Therefore, this attack vector requires both attacker authentication (to access the local system) and user interaction (to turn on the Mobile Hotspot).


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26220
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2016 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Information Disclosure 5035856 Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26220 Anonymous


CVE-2024-26221 - Windows DNS Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26221
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26221
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26221 Rajesh Kumar with Microsoft


CVE-2024-26222 - Windows DNS Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26222
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26222
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26222 Rajesh Kumar with Microsoft


CVE-2024-26223 - Windows DNS Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26223
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26223
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26223 Rajesh Kumar with Microsoft


CVE-2024-26224 - Windows DNS Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26224
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26224
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26224 Rajesh Kumar with Microsoft


CVE-2024-26227 - Windows DNS Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26227
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26227
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26227 Rajesh Kumar with Microsoft


CVE-2024-26231 - Windows DNS Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26231
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26231
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26231 Rajesh Kumar with Microsoft


CVE-2024-26233 - Windows DNS Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26233
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

In a network-based attack an attacker would need to have the privileges to query the Domain Name Service (DNS). If the timing of DNS queries is perfect, the attacker could execute code remotely on the target server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26233
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26233 Rajesh Kumar with Microsoft


CVE-2024-26241 - Win32k Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26241
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Win32k Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26241
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26241 Anonymous


CVE-2024-26243 - Windows USB Print Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26243
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Print Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26243
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26243 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2024-26248 - Windows Kerberos Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26248
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kerberos Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment of the targeted component.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level.


Where can I find more information about what steps I need to take to be fully protected from this vulnerability?

The updates released on or after April 9, 2024 will NOT fully address the security issues in this vulnerability. For more information about how to manage PAC validation changes related to this CVE and the steps you need to take to be fully protected, see How to manage PAC Validation changes related to CVE-2024-26248 and CVE-2024-29056.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26248
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26248 Anonymous


CVE-2024-26210 - Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26210
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26210
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution 5035857 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26210 bee13oy with Cyber Kunlun Lab


Anonymous


CVE-2024-26229 - Windows CSC Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26229
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows CSC Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26229
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26229 Erik Egsgard with Field Effect Software


CVE-2024-26234 - Proxy Driver Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26234
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Proxy Driver Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26234
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Spoofing 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Spoofing 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Spoofing 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Spoofing 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Spoofing 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Spoofing 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Spoofing 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Spoofing 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Spoofing 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Spoofing 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Spoofing
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Spoofing
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Spoofing
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Spoofing 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Spoofing 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Spoofing 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Spoofing 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Spoofing 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Spoofing 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Spoofing 5035920
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Spoofing 5035920
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Spoofing 5035920
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Spoofing 5035920
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Spoofing 5035888
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Spoofing 5035888
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Spoofing 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Spoofing 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Spoofing 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Spoofing 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Spoofing 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Spoofing 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Spoofing 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Spoofing 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Spoofing 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Spoofing 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Spoofing 5035856 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26234 Christopher Budd with Sophos


CVE-2024-26235 - Windows Update Stack Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26235
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Update Stack Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could overwrite arbitrary file content in the security context of the local system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26235
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26235 gabe_k


CVE-2024-26236 - Windows Update Stack Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26236
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Update Stack Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26236
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26236 gabe_k


ziming zhang with Ant Security Light-Year Lab


CVE-2024-26237 - Windows Defender Credential Guard Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26237
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Defender Credential Guard Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

A domain user could use this vulnerability to elevate privileges to SYSTEM assigned integrity level.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26237
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26237 Anonymous


CVE-2024-26242 - Windows Telephony Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26242
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Telephony Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could create or delete files in the security context of the “NT AUTHORITY\ LOCAL SERVICE” account.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26242
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26242 k0shl with Kunlun Lab


CVE-2024-26244 - Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26244
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26244
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26244 Anonymous


CVE-2024-26245 - Windows SMB Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26245
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows SMB Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26245
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26245 Anonymous


CVE-2024-26207 - Windows Remote Access Connection Manager Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26207
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26207
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Information Disclosure 5035856 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26207 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2024-26208 - Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26208
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

To successfully exploit this vulnerability, the target server must be configured to allow remote activation of the COM object. In addition, the attacker must have sufficient user privileges on that server.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26208
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution None Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution None Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26208 wkai with Codesafe Team of Legendsec at QI-ANXIN Group


CVE-2024-26211 - Windows Remote Access Connection Manager Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26211
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26211
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26211 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2024-26212 - DHCP Server Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26212
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DHCP Server Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26212
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Denial of Service 5035920
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Denial of Service 5035920
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Denial of Service 5035920
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Denial of Service 5035920
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Denial of Service 5035888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Denial of Service 5035888
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Denial of Service 5035930 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Denial of Service 5035930 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Denial of Service 5035885 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Denial of Service 5035885 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Denial of Service 5035855 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Denial of Service 5035855 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Denial of Service 5035856 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26212 Anonymous


CVE-2024-26213 - Microsoft Brokering File System Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26213
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26213
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26213 gabe_k


Naceri with MSRC Vulnerabilities & Mitigations


CVE-2024-26214 - Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26214
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via OLEDB (CVSS metric AV:N), which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26214
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Remote Code Execution 5035858 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution 5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Remote Code Execution
5035845
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Remote Code Execution 5035854 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Remote Code Execution 5035853 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Remote Code Execution 5035920
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Remote Code Execution 5035888
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Remote Code Execution 5035930 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Remote Code Execution 5035885 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Remote Code Execution 5035855 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Remote Code Execution 5035849 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Remote Code Execution 5035856 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26214 Anonymous


CVE-2024-26215 - DHCP Server Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26215
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: DHCP Server Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.2
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityHigh
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26215
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Denial of Service 5035920
Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Denial of Service 5035920
Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Denial of Service 5035920
Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Denial of Service 5035920
Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Denial of Service 5035888
Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Denial of Service 5035888
Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Denial of Service 5035930 Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Denial of Service 5035930 Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Denial of Service 5035885 Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Denial of Service 5035885 Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Denial of Service 5035855 Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Denial of Service 5035855 Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Denial of Service 5035849 Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Denial of Service None Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Denial of Service None Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Denial of Service 5035856 Base: 7.5
Temporal: 7.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:H/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26215 Anonymous


CVE-2024-26216 - Windows File Server Resource Management Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26216
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows File Server Resource Management Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker would only be able to delete targeted files on a system.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authorized attacker with guest privileges must send a victim a malicious site and convince them to open it.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then trigger an event that could exploit the vulnerability and save an invalid state to a database or trigger other unintended actions.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26216
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege None Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26216 BeiBei Zhao


YingLi Sun


FangMing Gu


QingHe Xie


BeiBei Zhao, YingLi Sun, FangMing Gu and QingHe Xie


CVE-2024-26217 - Windows Remote Access Connection Manager Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26217
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26217
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Information Disclosure None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Information Disclosure 5035856 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26217 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2024-26226 - Windows Distributed File System (DFS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26226
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Distributed File System (DFS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is sensitive information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26226
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Information Disclosure 5035920
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Information Disclosure 5035920
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Information Disclosure 5035920
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Information Disclosure 5035920
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Information Disclosure 5035888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Information Disclosure 5035888
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Information Disclosure 5035930 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Information Disclosure 5035930 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Information Disclosure 5035855 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Information Disclosure 5035855 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Information Disclosure 5035849 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Information Disclosure 5035849 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Information Disclosure 5035856 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26226 George Hughey with MSRC Vulnerabilities & Mitigations


k0shl with Kunlun Lab


CVE-2024-26228 - Windows Cryptographic Services Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26228
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cryptographic Services Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass RSA signature verification on a vulnerable system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26228
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Security Feature Bypass 5035888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Security Feature Bypass 5035888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26228 Microsoft Offensive Research & Security Engineering


CVE-2024-26230 - Windows Telephony Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26230
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Telephony Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26230
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26230 None

CVE-2024-26239 - Windows Telephony Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26239
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Telephony Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26239
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Elevation of Privilege 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26239 Anonymous


CVE-2024-26240 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26240
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


How could an attacker successfully exploit this vulnerability?

To exploit the vulnerability, an attacker who has physical access or Administrative rights to a target device could install a malicious .bcd file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26240
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Security Feature Bypass 5035888
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Security Feature Bypass 5035888
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26240 Azure Yang with Kunlun Lab


CVE-2024-26251 - Microsoft SharePoint Server Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26251
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Server Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityHigh
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires multiple conditions to be met, such as specific application behavior, user actions, manipulation of parameters passed to a function, and impersonation of an integrity level token.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26251
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Server 2016 5002583 (Security Update) Important Spoofing None Base: 6.8
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:H/RL:O/RC:C
16.0.5443.1000 Maybe None
Microsoft SharePoint Server 2019 5002580 (Security Update) Important Spoofing 5002562 Base: 6.8
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:H/RL:O/RC:C
16.0.10409.20027 Maybe None
Microsoft SharePoint Server Subscription Edition 5002581 (Security Update) Important Spoofing None Base: 6.8
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:H/RL:O/RC:C
16.0.17328.20246 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26251 Kajetan Rostojek


CVE-2024-26257 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26257
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityHigh
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Are the updates for the Microsoft Office 2021 for Mac currently available?

The security update for Microsoft Office 2021 for Mac is not immediately available. The update will be released as soon as possible, and when it is available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26257
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 7.5
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC for Mac 2021 Important Remote Code Execution None Base: N/A
Temporal: N/A
Vector: N/A
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26257 Anonymous


CVE-2024-28924 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28924
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to compromise admin credentials on the device.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28924
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28924 Zammis Clark


CVE-2024-28925 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28925
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.0/TemporalScore:7.0
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28925
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Security Feature Bypass 5035920
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Security Feature Bypass 5035888
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Security Feature Bypass 5035888
Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 8.0
Temporal: 7.0
Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28925 Azure Yang with Kunlun Lab


CVE-2024-28897 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28897
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28897
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28897 Azure Yang with Kunlun Lab


CVE-2024-28900 - Windows Remote Access Connection Manager Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28900
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28900
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Information Disclosure 5035858 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure 5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Information Disclosure
5035845
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Information Disclosure 5035854 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Information Disclosure 5035853 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Information Disclosure 5035885 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Information Disclosure 5035855 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Information Disclosure 5035849 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Information Disclosure 5035857 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Information Disclosure 5035856 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28900 George Hughey with MSRC Vulnerabilities & Mitigations


CVE-2024-28904 - Microsoft Brokering File System Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28904
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could overwrite arbitrary file content in the security context of the local system.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker would only be able to delete targeted files on a system.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires multiple conditions to be met, such as specific application behavior, user actions, manipulation of parameters passed to a function, and impersonation of an integrity level token.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28904
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28904 Naceri with MSRC Vulnerabilities & Mitigations


CVE-2024-28907 - Microsoft Brokering File System Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28907
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Brokering File System Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition and also to take additional actions prior to exploitation to prepare the target environment.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain the ability to create or open a new registry key without enforcing access checking.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28907
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28907 Naceri with MSRC Vulnerabilities & Mitigations


CVE-2024-28917 - Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28917
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.2/TemporalScore:5.4
Base score metrics
Attack VectorAdjacent
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, Confidentiality is high (C:H) but integrity is none (I:N) and availability is none (A:N). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could gain access to sensitive information such as Azure IoT Operations secrets and potentially other credentials or access tokens stored within the Kubernetes cluster.


What actions do customers need to take to protect themselves from this vulnerability?

In addition to updating any affected Extensions which are used in their environment, to be protected customers must also update their Azure Arc Agent to version >= 1.14.6 using the steps described here: https://learn.microsoft.com/en-us/cli/azure/connectedk8s?view=azure-cli-latest#az-connectedk8s-upgrade.


According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability?

An attacker must have access to the network connected to the targeted Arc-enabled Kubernetes Cluster but does not require permissions to connect or manage the Kubernetes cluster to exploit the vulnerability.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability enables an attacker to compromise a Cluster Extension's identity token and access other components or Azure resources associated with the Arc-enabled Kubernetes cluster.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could leverage the Azure Arc Cluster Extension's identity token by bypassing the Kubernetes namespace's RBAC and access other Azure resources on behalf of the Extension.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28917
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Arc Cluster microsoft.azstackhci.operator Extension Release Notes (Security Update) Important Elevation of Privilege None Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
5.0.5 Maybe None
Azure Arc Cluster microsoft.azure.hybridnetwork Extension Release Notes (Security Update) Important Elevation of Privilege None Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
1.0.2620-162 Maybe None
Azure Arc Cluster microsoft.azurekeyvaultsecretsprovider Extension Release Notes (Security Update) Important Elevation of Privilege None Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
1.5.2 Maybe None
Azure Arc Cluster microsoft.iotoperations.mq Extension Release Notes (Security Update) Important Elevation of Privilege None Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
0.3.0-preview Maybe None
Azure Arc Cluster microsoft.networkfabricserviceextension Extension Release Notes (Security Update) Important Elevation of Privilege None Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
5.1.3 Maybe None
Azure Arc Cluster microsoft.openservicemesh Extension Release Notes (Security Update) Important Elevation of Privilege None Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
1.2.6 Maybe None
Azure Arc Cluster microsoft.videoindexer Extension Release Notes (Security Update) Important Elevation of Privilege None Base: 6.2
Temporal: 5.4
Vector: CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C
1.1.2 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28917 Vladimir Abramzon with Microsoft Offensive Research Security Engineering


CVE-2024-28926 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28926
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28926
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28926 Anonymous


CVE-2024-28927 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28927
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28927
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28927 Anonymous


Sam Pope with MSRC Vulnerabilities & Mitigations


CVE-2024-28930 - Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28930
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28930
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows 5037570 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows 5037571 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.35 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.4.18 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.6.14 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.9 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.9.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28930 Yuki Chen with Cyber KunLun


Yuki Chen with Cyber KunLun


VictorV(Tang tianwen) with Kunlun Lab


VictorV(Tang tianwen) with Kunlun Lab


bee13oy with Cyber Kunlun Lab


bee13oy with Cyber Kunlun Lab


CVE-2024-28933 - Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28933
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28933
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows 5037570 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows 5037571 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.35 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.4.18 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.6.14 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.9 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.9.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28933 Anonymous


CVE-2024-28934 - Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28934
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28934
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows 5037570 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows 5037571 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.35 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.4.18 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.6.14 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.9 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.9.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28934 Anonymous


bee13oy with Cyber Kunlun Lab


CVE-2024-28935 - Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28935
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28935
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows 5037570 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows 5037571 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.35 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.4.18 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.6.14 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.9 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.9.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28935 Anonymous


Anonymous


CVE-2024-28937 - Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28937
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28937
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows 5037570 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows 5037571 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.35 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.4.18 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.6.14 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.9 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.9.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28937 Anonymous


CVE-2024-28938 - Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28938
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server database via ODBC. This could result in the database returning malicious data that might cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28938
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows 5037570 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows 5037571 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None
Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10) Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.11.35 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.4.18 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.6.14 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.8.9 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.9.6 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28938 Anonymous


CVE-2024-28940 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28940
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28940
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28940 Anonymous


CVE-2024-28941 - Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28941
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28941
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows 5037570 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows 5037571 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28941 Anonymous


CVE-2024-28943 - Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28943
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft ODBC Driver 17 or 18 for SQL Server. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via ODBC, which could result in the client receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28943
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft ODBC Driver 17 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 17 for SQL Server on Windows 5037570 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
17.10.6.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Linux Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on MacOS Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft ODBC Driver 18 for SQL Server on Windows 5037571 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.3.3.1 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28943 Anonymous


CVE-2024-28944 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-28944
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-28944
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-28944 Anonymous


CVE-2024-29044 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29044
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29044
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29044 Anonymous


CVE-2024-29046 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29046
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29046
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29046 Anonymous


CVE-2024-29048 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29048
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29048
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29048 Anonymous


CVE-2024-29049 - Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29049
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.1/TemporalScore:3.6
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:N). What does that mean for this vulnerability?

There are limited impact to Confidentiality and Integrity and no Avaibility impact from exploiting this vulnerability. An attacker would need to combine this with other vulnerabilities to perform an attack.


Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 123.0.2420.81 4/4/2024 123.0.6312.105/.106/.107
Extended Stable 122.0.2365.120 4/4/2024 122.0.6261.156

Mitigations:
None
Workarounds:
None
Revision:
1.0    04-Apr-24    

Information published.


Moderate Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29049
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Moderate Spoofing None Base: 4.1
Temporal: 3.6
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C
123.0.2420.81 No None
Microsoft Edge (Chromium-based) Extended Stable Release Notes (Security Update) Moderate Spoofing None Base: N/A
Temporal: N/A
Vector: N/A
122.0.2365.120 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29049 Abdan Mukhithon Alkayyis


CVE-2024-29052 - Windows Storage Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29052
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Storage Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain administrator privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29052
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Elevation of Privilege
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Elevation of Privilege 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Elevation of Privilege 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29052 Christopher Lee (cubeof11)


CVE-2024-29053 - Microsoft Defender for IoT Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29053
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Defender for IoT Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


How could an attacker exploit this vulnerability?

An authenticated attacker with access to the file upload feature could exploit this path traversal vulnerability by uploading malicious files to sensitive locations on the server.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29053
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Defender for IoT Release Notes (Security Update) Critical Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
24.1.3 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29053 Siemens Energy


Siemens Energy


CVE-2024-29055 - Microsoft Defender for IoT Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29055
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Defender for IoT Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29055
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Defender for IoT Release Notes (Security Update) Important Elevation of Privilege None Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
24.1.3 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29055 Anonymous


CVE-2024-29054 - Microsoft Defender for IoT Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29054
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Defender for IoT Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.2/TemporalScore:6.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29054
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Defender for IoT Release Notes (Security Update) Important Elevation of Privilege None Base: 7.2
Temporal: 6.3
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
24.1.3 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29054 Anonymous


CVE-2024-29056 - Windows Authentication Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29056
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Authentication Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability?

An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability).


Where can I find more information about what steps I need to take to be fully protected from this vulnerability?

The updates released on or after April 9, 2024 will NOT fully address the security issues in this vulnerability. For more information about how to manage PAC validation changes related to this CVE and the steps you need to take to be fully protected, see How to manage PAC Validation changes related to CVE-2024-26248 and CVE-2024-29056.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

A user from a cross-organization trust might obtain access that is granted to all users in an organization.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29056
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5036932 (Monthly Rollup)
5036950 (Security Only)
Important Elevation of Privilege 5035920
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22618
Yes 5036932
5036950
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5036967 (Monthly Rollup)
5036922 (Security Only)
Important Elevation of Privilege 5035888
Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27067 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Elevation of Privilege 5035930 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Elevation of Privilege 5035885 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Elevation of Privilege 5035855 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Elevation of Privilege 5035849 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Elevation of Privilege 5035857 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Elevation of Privilege 5035856 Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29056 None

CVE-2024-29061 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29061
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29061
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29061 Azure Yang with Kunlun Lab


CVE-2024-29062 - Secure Boot Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29062
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Secure Boot Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?

An authenticated attacker could exploit this vulnerability with LAN access.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29062
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 for x64-based Systems 5036925 (Security Update) Important Security Feature Bypass 5035858 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20596 Yes None
Windows 10 Version 1607 for 32-bit Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1607 for x64-based Systems 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2012 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 (Server Core installation) 5036969 (Monthly Rollup) Important Security Feature Bypass 5035930 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24821 Yes None
Windows Server 2012 R2 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2012 R2 (Server Core installation) 5036960 (Monthly Rollup) Important Security Feature Bypass 5035885 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21924 Yes None
Windows Server 2016 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2016 (Server Core installation) 5036899 (Security Update) Important Security Feature Bypass 5035855 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6897 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29062 Azure Yang with Kunlun Lab


CVE-2024-20670 - Outlook for Windows Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20670
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Outlook for Windows Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of NTLM hashes.


How could an attacker exploit this vulnerability?

External attackers could send specially crafted emails that will cause a connection from the victim to an untrusted location of attackers' control. This will leak the Net-NTLMv2 hash of the victim to the untrusted network which an attacker can then relay to another service and authenticate as the victim.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker would have to send the victim a malicious URL that the victim would have to execute.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20670
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Outlook for Windows Release Notes (Security Update) Important Spoofing None Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
1.2023.0322.0100 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20670 Michael Pizzicaroli with Charles Schwab


CVE-2024-29982 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29982
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29982
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29982 Anonymous


CVE-2024-29983 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29983
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29983
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29983 Anonymous


CVE-2024-29984 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29984
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29984
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29984 Anonymous


Sam Pope with MSRC Vulnerabilities & Mitigations


CVE-2024-29985 - Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29985
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

I am running SQL Server on my system. What action do I need to take?

Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.

I am running my own application on my system. What action do I need to take?

Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.

I am running an application from a software vendor on my system. What action do I need to take?

Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability

There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?

  • First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
  • Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.

Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.

Update Number Title Apply if current product version is… This security update also includes servicing releases up through…
5036343 Security update for SQL Server 2022 CU12+GDR 16.0.4003.1 - 16.0.4115.5 KB 5029503 - SQL2022 RTM CU8
5035432 Security update for SQL Server 2022 RTM+GDR 16.0.1000.6 - 16.0.1110.1 KB 5029379 - Previous SQL2022 RTM GDR
5036335 Security update for SQL Server 2019 CU25+GDR 15.0.4003.23 - 15.0.4355.3 KB 5029378 - SQL2019 RTM CU22
5035434 Security update for SQL Server 2019 RTM+GDR 15.0.2000.5 - 15.0.2104.1 KB 5029377 - Previous SQL2019 RTM GDR

What are the GDR and CU update designations and how do they differ?

The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.

  • GDR updates – cumulatively only contain security updates for the given baseline.
  • CU updates – cumulatively contain all functional fixes and security updates for the given baseline.

For any given baseline, either the GDR or CU updates could be options (see below).

  • If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
  • If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
  • If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.

Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.

Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?

Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user (UI:R) into attempting to connect to a malicious SQL server database via a connection driver (for example: OLE DB or OLEDB as applicable). This could result in the database returning malicious data that could cause arbitrary code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29985
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OLE DB Driver 18 for SQL Server 5037572 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
18.7.0002.0 Maybe None
Microsoft OLE DB Driver 19 for SQL Server 5037573 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
19.3.0003.0 Maybe None
Microsoft SQL Server 2019 for x64-based Systems (CU 25) 5036335 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.4360.2 Yes None
Microsoft SQL Server 2019 for x64-based Systems (GDR) 5035434 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.0.2110.4 Yes None
Microsoft SQL Server 2022 for x64-based Systems (CU 12) 5036343 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.4120.1 Yes None
Microsoft SQL Server 2022 for x64-based Systems (GDR) 5035432 (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.1115.1 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29985 Anonymous


CVE-2024-23593 - Lenovo: CVE-2024-23593 Zero Out Boot Manager and drop to UEFI Shell

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-23593
MITRE
NVD

Issuing CNA: Lenovo

CVE Title: Lenovo: CVE-2024-23593 Zero Out Boot Manager and drop to UEFI Shell
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass Secure Boot.


Why is this Lenovo CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in certain Lenovo bootloaders. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the vulnerability.

Please see the following for more information:


Are there additional steps I need to take to be protected from this vulnerability?

All customers should apply the April 9, 2024 Windows security updates. These security updates address this vulnerability by updating the Windows Boot Manager and other components, but the protections are not enabled by default. Additional steps are required at this time to mitigate this vulnerability. Please refer to [https://support.microsoft.com/help/5025885](KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932). This article describes the protection against this Secure Boot security feature bypass, how to enable the protections, and guidance to update bootable media.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-23593
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 1809 for x64-based Systems 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 21H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass 5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4291
Yes 5036892
Windows 10 Version 22H2 for 32-bit Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for ARM64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 10 Version 22H2 for x64-based Systems 5036892 (Security Update) Important Security Feature Bypass
5035845
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4291
Yes 5036892
Windows 11 version 21H2 for ARM64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 version 21H2 for x64-based Systems 5036894 (Security Update) Important Security Feature Bypass 5035854 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2899 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 22H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3435 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows 11 Version 23H2 for x64-based Systems 5036893 (Security Update) Important Security Feature Bypass 5035853 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3447 Yes None
Windows Server 2019 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2019 (Server Core installation) 5036896 (Security Update) Important Security Feature Bypass 5035849 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5696 Yes None
Windows Server 2022 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022 (Server Core installation) 5036909 (Security Update) Important Security Feature Bypass 5035857 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2402 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5036910 (Security Update) Important Security Feature Bypass 5035856 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.830 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-23593 Zammis Clark


CVE-2024-29989 - Azure Monitor Agent Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29989
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Monitor Agent Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities.


What actions do customers need to take to protect themselves from this vulnerability?

Customers who have disabled Automatic Extension Upgrades or would like to upgrade an extension immediately must manually update their Azure Monitor Agent to the latest version. For more information on how to perform a manual update, see Manage Azure Monitor Agent.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability?

This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data that could include data that results in the service being unavailable.


How could an attacker exploit this vulnerability and what privileges could an attacker gain?

An authenticated attacker with read access permissions can exploit this vulnerability to perform arbitrary file and folder deletion on the host where the Azure Monitor Agent is installed.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29989
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Monitor Agent Release Notes (Security Update) Important Elevation of Privilege None Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H/E:U/RL:O/RC:C
1.24.0 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29989 Fangming Gu


Filip Dragović


R4nger & Zhiniang Peng


CVE-2024-29992 - Azure Identity Library for .NET Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29992
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Identity Library for .NET Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is data inside the targeted website like IDs, tokens, nonces, and other sensitive information.

Which credential types provided by the Azure Identity client library are affected?

The vulnerability exists in the following credential types:

  1. DefaultAzureCredential
  2. ManagedIdentityCredential

Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Moderate Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29992
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Identity Library for .NET Release Notes (Security Update) Moderate Information Disclosure None Base: 5.5
Temporal: 5.3
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/RL:O/RC:C
1.11.0 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29992 Anonymous


CVE-2024-29993 - Azure CycleCloud Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29993
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure CycleCloud Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker who successfully exploited this vulnerability could elevate privileges to the SuperUser role in the affected Azure CycleCloud instance.


According to the CVSS metric, privileges required is Low (PR:L). What does that mean for this vulnerability?

To exploit this vulnerability an attacker must have an account with the User role assigned.


Mitigations:
None
Workarounds:
None
Revision:
1.0    09-Apr-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29993
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure CycleCloud 8.6.0 Release Notes (Security Update) Important Elevation of Privilege None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.1 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29993 Anonymous


CVE-2019-3816 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-3816
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Apr-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-3816
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM openwsman (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.6.8-13 Unknown None
CBL Mariner 2.0 x64 openwsman (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.6.8-13 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-3816 None

CVE-2019-3833 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-3833
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Apr-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-3833
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM openwsman (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.8-13 Unknown None
CBL Mariner 2.0 x64 openwsman (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.8-13 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-3833 None