Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
Microsoft.NET CVE-2024-21392 .NET and Visual Studio Denial of Service Vulnerability
MicrosoftAzure Data Studio CVE-2024-26203 Azure Data Studio Elevation of Privilege Vulnerability
MicrosoftAzure SDK CVE-2024-21421 Azure SDK Spoofing Vulnerability
Intel CorporationIntel CVE-2023-28746 Intel: CVE-2023-28746 Register File Data Sampling (RFDS)
MicrosoftMicrosoft Authenticator CVE-2024-21390 Microsoft Authenticator Elevation of Privilege Vulnerability
MicrosoftMicrosoft Azure Kubernetes Service CVE-2024-21400 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
MicrosoftMicrosoft Django Backend for SQL Server CVE-2024-26164 Microsoft Django Backend for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-21419 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-2174 Chromium: CVE-2024-2174 Inappropriate implementation in V8
ChromeMicrosoft Edge (Chromium-based) CVE-2024-2173 Chromium: CVE-2024-2173 Out of bounds memory access in V8
ChromeMicrosoft Edge (Chromium-based) CVE-2024-2176 Chromium: CVE-2024-2176 Use after free in FedCM
MicrosoftMicrosoft Edge for Android CVE-2024-26167 Microsoft Edge for Android Spoofing Vulnerability
MicrosoftMicrosoft Exchange Server CVE-2024-26198 Microsoft Exchange Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Graphics Component CVE-2024-21437 Windows Graphics Component Elevation of Privilege Vulnerability
MicrosoftMicrosoft Intune CVE-2024-26201 Microsoft Intune Linux Agent Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office CVE-2024-26199 Microsoft Office Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office SharePoint CVE-2024-21426 Microsoft SharePoint Server Remote Code Execution Vulnerability
MicrosoftMicrosoft QUIC CVE-2024-26190 Microsoft QUIC Denial of Service Vulnerability
MicrosoftMicrosoft Teams for Android CVE-2024-21448 Microsoft Teams for Android Information Disclosure Vulnerability
MicrosoftMicrosoft WDAC ODBC Driver CVE-2024-21451 Microsoft ODBC Driver Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21441 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-26161 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-26166 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21444 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-21450 Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
MicrosoftMicrosoft Windows SCSI Class System File CVE-2024-21434 Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability
MicrosoftOpen Management Infrastructure CVE-2024-21330 Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability
MicrosoftOpen Management Infrastructure CVE-2024-21334 Open Management Infrastructure (OMI) Remote Code Execution Vulnerability
MicrosoftOutlook for Android CVE-2024-26204 Outlook for Android Information Disclosure Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2024-21407 Windows Hyper-V Remote Code Execution Vulnerability
MicrosoftRole: Windows Hyper-V CVE-2024-21408 Windows Hyper-V Denial of Service Vulnerability
MicrosoftSkype for Consumer CVE-2024-21411 Skype for Consumer Remote Code Execution Vulnerability
MicrosoftSoftware for Open Networking in the Cloud (SONiC) CVE-2024-21418 Software for Open Networking in the Cloud (SONiC) Elevation of Privilege Vulnerability
MicrosoftVisual Studio Code CVE-2024-26165 Visual Studio Code Elevation of Privilege Vulnerability
MicrosoftWindows AllJoyn API CVE-2024-21438 Microsoft AllJoyn API Denial of Service Vulnerability
MicrosoftWindows Cloud Files Mini Filter Driver CVE-2024-26160 Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
MicrosoftWindows Composite Image File System CVE-2024-26170 Windows Composite Image File System (CimFS) Elevation of Privilege Vulnerability
MicrosoftWindows Compressed Folder CVE-2024-26185 Windows Compressed Folder Tampering Vulnerability
MicrosoftWindows Defender CVE-2024-20671 Microsoft Defender Security Feature Bypass Vulnerability
MicrosoftWindows Error Reporting CVE-2024-26169 Windows Error Reporting Service Elevation of Privilege Vulnerability
MicrosoftWindows Hypervisor-Protected Code Integrity CVE-2024-21431 Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability
MicrosoftWindows Installer CVE-2024-21436 Windows Installer Elevation of Privilege Vulnerability
MicrosoftWindows Kerberos CVE-2024-21427 Windows Kerberos Security Feature Bypass Vulnerability
MicrosoftWindows Kernel CVE-2024-26177 Windows Kernel Information Disclosure Vulnerability
MicrosoftWindows Kernel CVE-2024-26176 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-26174 Windows Kernel Information Disclosure Vulnerability
MicrosoftWindows Kernel CVE-2024-26182 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-26181 Windows Kernel Denial of Service Vulnerability
MicrosoftWindows Kernel CVE-2024-26178 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-26173 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-21443 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows NTFS CVE-2024-21446 NTFS Elevation of Privilege Vulnerability
MicrosoftWindows ODBC Driver CVE-2024-21440 Microsoft ODBC Driver Remote Code Execution Vulnerability
MicrosoftWindows ODBC Driver CVE-2024-26162 Microsoft ODBC Driver Remote Code Execution Vulnerability
MicrosoftWindows ODBC Driver CVE-2024-26159 Microsoft ODBC Driver Remote Code Execution Vulnerability
MicrosoftWindows OLE CVE-2024-21435 Windows OLE Remote Code Execution Vulnerability
MicrosoftWindows Print Spooler Components CVE-2024-21433 Windows Print Spooler Elevation of Privilege Vulnerability
MicrosoftWindows Standards-Based Storage Management Service CVE-2024-26197 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
MicrosoftWindows Telephony Server CVE-2024-21439 Windows Telephony Server Elevation of Privilege Vulnerability
MicrosoftWindows Update Stack CVE-2024-21432 Windows Update Stack Elevation of Privilege Vulnerability
MicrosoftWindows USB Hub Driver CVE-2024-21429 Windows USB Hub Driver Remote Code Execution Vulnerability
MicrosoftWindows USB Print Driver CVE-2024-21442 Windows USB Print Driver Elevation of Privilege Vulnerability
MicrosoftWindows USB Print Driver CVE-2024-21445 Windows USB Print Driver Elevation of Privilege Vulnerability
MicrosoftWindows USB Serial Driver CVE-2024-21430 Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnerability

CVE-2024-20671 - Microsoft Defender Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-20671
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Defender Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An authenticated attacker who successfully exploited this vulnerability could prevent Microsoft Defender from starting.


References Identification
Last version of the Windows Defender Antimalware Platform affected by this vulnerability Version 4.18.23110.3
First version of the Windows Defender Antimalware Platform with this vulnerability addressed Version 4.18.24010.12

See Manage Updates Baselines Microsoft Defender Antivirus for more information.

Microsoft Defender is disabled in my environment, why are vulnerability scanners showing that I am vulnerable to this issue?

Vulnerability scanners are looking for specific binaries and version numbers on devices. Microsoft Defender files are still on disk even when disabled. Systems that have disabled Microsoft Defender are not in an exploitable state.

Why is no action required to install this update?

In response to a constantly changing threat landscape, Microsoft frequently updates malware definitions and the Windows Defender Antimalware Platform. In order to be effective in helping protect against new and prevalent threats, antimalware software must be kept up to date with these updates in a timely manner.

For enterprise deployments as well as end users, the default configuration in Microsoft antimalware software helps ensure that malware definitions and the Windows Defender Antimalware Platform are kept up to date automatically. Product documentation also recommends that products are configured for automatic updating.

Best practices recommend that customers regularly verify whether software distribution, such as the automatic deployment of Windows Defender Antimalware Platform updates and malware definitions, is working as expected in their environment.

How often are the Windows Defender Antimalware Platform and malware definitions updated?

Microsoft typically releases an update for the Windows Defender Antimalware Platform once a month or as needed to protect against new threats. Microsoft also typically updates the malware definitions three times daily and can increase the frequency when needed.

Depending on which Microsoft antimalware software is used and how it is configured, the software may search for platform, engine and definition updates every day when connected to the Internet, up to multiple times daily. Customers can also choose to manually check for updates at any time.

What is the Windows Defender Antimalware Platform?

The Windows Defender Antimalware Platform is a collection of user-mode binaries (e.g. MsMpEng.exe) and kernel-mode drivers that run on top of Windows to keep devices protected against new and prevalent threats.

Windows Defender uses the Windows Defender Antimalware Platform. On which products is Defender installed and active by default?

Defender runs on all supported versions of Windows.

Are there other products that use the Windows Defender Antimalware Platform?

Yes, Microsoft System Center Endpoint Protection, Microsoft System Center 2012 R2 Endpoint Protection, Microsoft System Center 2012 Endpoint Protection and Microsoft Security Essentials.

Does this update contain any additional security-related changes to functionality?

Yes.  In addition to the changes that are listed for this vulnerability, this update includes defense-in-depth updates to help improve security-related features.

Suggested Actions

Verify that the update is installed

Customers should verify that the latest version of the Microsoft Malware Protection Platform and definition updates are being actively downloaded and installed for their Microsoft antimalware products.

  1. Open the Windows Security program. For example, type Security in the Search bar, and select the Windows Security program.
  2. In the navigation pane, select Virus & threat protection.
  3. Under Virus & threat protection updates in the main window, select Check for updates
  4. Select Check for updates again.
  5. In the navigation pane, select Settings, and then select About.
  6. Examine the Platform Version number. The update was successfully installed if the Malware Protection Platform version number or the signature package version number matches or exceeds the version number that you are trying to verify as installed.

Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-20671
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Defender Antimalware Platform Release Notes (Security Update) Important Security Feature Bypass None Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
4.18.24010.12 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-20671 Manuel Feifel with Infoguard (Vurex)


CVE-2024-21392 - .NET and Visual Studio Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21392
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET and Visual Studio Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21392
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 7.0 5036451 (Monthly Rollup) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
7.0.17 Maybe None
.NET 8.0 5036452 (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
8.0.3 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
17.4.17 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
17.6.13 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
17.8.8 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C
17.9.3 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21392 None

CVE-2024-21411 - Skype for Consumer Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21411
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Skype for Consumer Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by sending the user a malicious link or a malicious image via Instant Message and then convincing the user to click the link or image.


How do I get the update?

  1. Click the Download link.
  2. Under Skype for Desktop select the Get Skype for Windows 10 & 11 arrow to display download options.
  3. Select from the following to download the version you need for your Desktop.
  • Get Skype for Windows
  • Get Skype for Mac
  • Get Skype for Linux SNAP

To verify that you have the latest version of Skype installed, Select Settings > Help & Feedback.

For more information on how to update Skype, see Updating to the latest version of Skype.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploited this vulnerability could gain high privileges, which include read, write, and delete functionality.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21411
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Skype for Consumer Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.113 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21411 Hector Peralta (@hperalta89) and Nicol\xc3\xa1s Armua working with Trend Micro Zero Day Initiative


CVE-2024-21418 - Software for Open Networking in the Cloud (SONiC) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21418
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Software for Open Networking in the Cloud (SONiC) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could an attacker gain with a successful exploitation?

An unprivileged attacker with read only permissions can escalate to Root in the Border Gateway Protocol container and perform specific actions that enable them to escape the container.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21418
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Software for Open Networking in the Cloud (SONiC) 201811 Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
20181130.106 Maybe None
Software for Open Networking in the Cloud (SONiC) 201911 Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
20191130.89 Maybe None
Software for Open Networking in the Cloud (SONiC) 202012 Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
20201231.96 Maybe None
Software for Open Networking in the Cloud (SONiC) 202205 Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
20220531.26 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21418 Sarah Mulnick


CVE-2024-21421 - Azure SDK Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21421
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure SDK Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What actions do customers need to take to protect themselves from this vulnerability?

Customers with deployments created prior to Oct 19. 2023 must manually upgrade azure-core to Azure Core Build 1.29.5 or higher to be protected. For information reference the following: https://azure.github.io/azure-sdk/releases/latest/index.html. Customers with deployments created after October 19, 2023 recieved the fix automatically and no action is needed.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21421
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure SDK Release Notes (Security Update) Important Spoofing None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.29.5 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21421 Chris Burr


Chris Burr


CVE-2024-21426 - Microsoft SharePoint Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21426
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft SharePoint Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H), integrity (I:H), and availability (A:H). What does that mean for this vulnerability?

An attacker who successfully exploits this vulnerability could perform a remote attack that could enable access to the victim's information and the ability to alter information. Successful exploitation could also potentially cause downtime for the targeted environment.


According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21426
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft SharePoint Enterprise Server 2016 5002559 (Security Update) Important Remote Code Execution 5002541 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5439.1000 Maybe None
Microsoft SharePoint Server 2019 5002562 (Security Update) Important Remote Code Execution 5002539 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.10408.20000 Maybe None
Microsoft SharePoint Server Subscription Edition 5002564 (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.17328.20136 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21426 kap0k


CVE-2024-21429 - Windows USB Hub Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21429
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Hub Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21429
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Remote Code Execution 5034769 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21429 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-21430 - Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21430
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.7/TemporalScore:5.1
Base score metrics
Attack VectorPhysical
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to physically access the target device. To gain access, an attacker must acquire the device after being unlocked by a legitimate user (target of opportunity) or possess the ability to pass device authentication or password protection mechanisms.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21430
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Remote Code Execution 5034769 Base: 5.7
Temporal: 5.1
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21430 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-21438 - Microsoft AllJoyn API Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21438
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft AllJoyn API Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21438
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Denial of Service 5034774 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Denial of Service 5034774 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Denial of Service 5034767 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Denial of Service 5034767 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Denial of Service 5034768 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Denial of Service 5034768 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Denial of Service 5034768 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Denial of Service 5034763
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Denial of Service 5034763
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Denial of Service 5034763
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Denial of Service
5034763
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Denial of Service
5034763
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Denial of Service
5034763
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Denial of Service 5034766 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Denial of Service 5034766 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Denial of Service 5034765 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Denial of Service 5034765 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Denial of Service 5034765 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Denial of Service 5034765 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2016 5035855 (Security Update) Important Denial of Service 5034767 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Denial of Service 5034767 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Denial of Service 5034768 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Denial of Service 5034768 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Denial of Service 5034770
5034860
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Denial of Service 5034770
5034860
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Denial of Service 5034769 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21438 ziming zhang with Ant Security Light-Year Lab


CVE-2024-21439 - Windows Telephony Server Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21439
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Telephony Server Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could execute code in the security context of the “NT AUTHORITY\Network Service” account.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21439
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21439 k0shl with Kunlun Lab


CVE-2024-21441 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21441
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21441
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Remote Code Execution 5034769 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21441 Anonymous


CVE-2024-21442 - Windows USB Print Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21442
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Print Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21442
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21442 Jongseong Kim, Byunghyun Kang, Sangjun Park, Yunjin Park, Kwon Yul and Seungchan Kim with 우리 오늘부터 0-day? (BoB 12th)


CVE-2024-21443 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21443
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability?

An administrative user must be convinced to open a malicious COM object like an .rtf file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21443
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2019 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.3
Temporal: 6.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21443 CHEN QINGYANG with Topsec Alpha Team


CVE-2024-21444 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21444
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21444
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Remote Code Execution 5034769 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21444 Anonymous


CVE-2024-21445 - Windows USB Print Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21445
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows USB Print Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21445
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21445 Jongseong Kim, Byunghyun Kang, Sangjun Park, Yunjin Park, Kwon Yul and Seungchan Kim with 우리 오늘부터 0-day? (BoB 12th)


CVE-2024-21446 - NTFS Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21446
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NTFS Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21446
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21446 Anonymous


CVE-2024-21450 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21450
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21450
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Remote Code Execution 5034769 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21450 Anonymous


CVE-2024-21451 - Microsoft ODBC Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21451
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21451
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Remote Code Execution 5034769 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21451 Anonymous


CVE-2024-26197 - Windows Standards-Based Storage Management Service Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26197
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26197
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Denial of Service 5034819 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Denial of Service 5034819 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Denial of Service 5034767 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Denial of Service 5034767 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Denial of Service 5034768 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Denial of Service 5034768 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Denial of Service 5034770
5034860
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Denial of Service 5034770
5034860
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26197 k0shl with Kunlun Lab


CVE-2024-26159 - Microsoft ODBC Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26159
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26159
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Remote Code Execution 5034769 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26159 Anonymous


CVE-2024-26190 - Microsoft QUIC Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26190
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft QUIC Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26190
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 7.0 5036451 (Monthly Rollup) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
7.0.17 Maybe None
.NET 8.0 5036452 (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
8.0.3 Maybe None
Microsoft Visual Studio 2022 version 17.4 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
17.4.17 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
17.6.13 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
17.8.8 Maybe None
Microsoft Visual Studio 2022 version 17.9 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
17.9.3 Maybe None
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Denial of Service 5034766 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Denial of Service 5034766 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Denial of Service 5034765 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Denial of Service 5034765 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Denial of Service 5034765 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Denial of Service 5034765 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Denial of Service 5034770
5034860
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Denial of Service 5034770
5034860
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Denial of Service 5034769 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26190 None

CVE-2024-26198 - Microsoft Exchange Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26198
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Exchange Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a specially crafted file to be placed either in an online directory or in a local network location. When a victim runs this file, it loads the malicious DLL.


How could an attacker exploit this vulnerability?

An unauthenticated attacker could exploit the vulnerability by placing a specially crafted file onto an online directory or in a local network location then convincing the user to open it. In a successful attack, this will then load a malicious DLL which could lead to a remote code execution.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26198
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Exchange Server 2016 Cumulative Update 23 5036386 (Security Update) Important Remote Code Execution 5030877
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.01.2507.037
Yes 5036386
Microsoft Exchange Server 2019 Cumulative Update 13 5036402 (Security Update) Important Remote Code Execution 5030877
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1258.032
Yes 5036402
Microsoft Exchange Server 2019 Cumulative Update 14 5036401 (Security Update) Important Remote Code Execution 5030877
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
15.02.1544.009
Yes 5036401

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26198 kap0k


CVE-2024-26199 - Microsoft Office Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26199
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated user could trigger this vulnerability. It does not require admin or other elevated privileges.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26199
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26199 Iván Almuiña from Hacking Corporation Sàrl


CVE-2024-26201 - Microsoft Intune Linux Agent Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26201
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Intune Linux Agent Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.6/TemporalScore:5.9
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires a user to modify a custom compliance script on the device after it is written to temporary storage and before execution of the script finishes.


According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) and integrity (I:H) but not availability (A:N). What does that mean for this vulnerability?

This vulnerability could allow an attacker to view potentially restricted information inside of a custom compliance script and tamper with the results of the scripts, but does not allow the attacker to make any other parts of the Intune service unavailable


What privileges could an attacker gain by successful exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could alter the results of a custom compliance script, bypassing compliance checks enforced by these scripts.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26201
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Intune Company Portal for Android Release Notes (Security Update) Important Elevation of Privilege None Base: 6.6
Temporal: 5.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
2402 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26201 Xenos with Preligens


CVE-2024-26203 - Azure Data Studio Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26203
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Data Studio Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:7.0
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityHigh
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

The attacker would gain the rights of the user that is running the affected application.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:L). What does that mean for this vulnerability?

An authenticated attacker must wait for the victim user to launch the application for the vulnerability to be exploited.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26203
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Data Studio Release Notes (Security Update) Important Elevation of Privilege None Base: 7.3
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C
1.48.0 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26203 Filip Dragović


CVE-2024-26161 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26161
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26161
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Remote Code Execution 5034769 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26161 Anonymous


CVE-2024-26164 - Microsoft Django Backend for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26164
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Django Backend for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit the vulnerability?

An attacker could use the unsanitized parameter into a SQL query to trigger SQL Injection.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Successful exploitation of this vulnerability simply requires the attacker or targeted user to leverage a Microsoft Access application to automatically talk to a SQL Server while utilizing a remote SQL Server address that they control.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26164
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
SQL Server backend for Django Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.4.1 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26164 Federico Martinez


CVE-2024-21330 - Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21330
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.0
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

Successful exploitation of this vulnerability will locally elevate the attacker's privileges to communicate as Root with OMI server.


What is OMI?

Open Management Infrastructure (OMI) is an open-source Web-Based Enterprise Management (WBEM) implementation for managing Linux and UNIX systems. SCOM uses this framework to orchestrate configuration management and log collection on Linux VMs. More information can be found here: GitHub - Open Management Infrastructure.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker be an authenticated user on the resource to access the necessary socket files to control the OMI service.


What actions do I need to take to be protected from this vulnerability?

Customers running affected versions of SCOM (System Center Operations Manager) should update to OMI version 1.8.1-0.


What products are affected by this vulnerability and how can I protect myself?

The following table lists the affected services and the required customer action to protect against this vulnerability.

Affected Product Fixed Version Number Customer action required
OMI as standalone package OMI version v1.8.1-0 Manually download the update here
System Center Operations Manager (SCOM) Management Pack for UNIX and Linux Operating Systems Management Pack for SCOM 2019: 10.19.1253.0 Manually download and update the applicable management packs:  2019, or 2022.
Management Pack for SCOM 2022: 10.22.1070.0
Log Analytics Agent OMS Agent for Linux GA v1.19.0 Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here.
Azure Security Center OMS Agent for Linux GA v1.19.0 Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here.
Container Monitoring Solution Image tag: microsoft-oms-latest with full ID: sha256:855bfeb0599e1e1d954ab8660808cc24bb190a4447818cd3fa8ad89bdad88df4 Manually update the OMS-docker image using instructions here.
Azure Sentinel OMS Agent for Linux GA v1.19.0 Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here.
Azure Automation OMS Agent for Linux GA v1.19.0 Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here.
Azure Automation Update Management OMS Agent for Linux GA v1.19.0 Manually download and update the OMS shell bundle using instructions here OR through Azure Powershell or Azure CLI using the instructions here.

Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21330
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Automation Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
OMS Agent for Linux GA 1.19.0 Maybe None
Azure Automation Update Management Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
OMS Agent for Linux GA v1.19.0 Maybe None
Azure Security Center Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
OMS Agent for Linux GA 1.19.0 Maybe None
Azure Sentinel Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
OMS Agent for Linux GA v1.19.0 Maybe None
Container Monitoring Solution Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
microsoft-oms-latest with full ID: sha256:855bfeb0 Maybe None
Log Analytics Agent Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
OMS Agent for Linux GA v1.19.0 Maybe None
Open Management Infrastructure Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
OMI version 1.8.1-0 Maybe None
Operations Management Suite Agent for Linux (OMS) Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
1.8.1-0 Maybe None
System Center Operations Manager (SCOM) 2019 Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.19.1253.0 Maybe None
System Center Operations Manager (SCOM) 2022 Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
10.22.1070.0 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21330 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-21334 - Open Management Infrastructure (OMI) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21334
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Open Management Infrastructure (OMI) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

A remote unauthenticated attacker could access the OMI instance from the Internet and send specially crafted requests to trigger a use-after-free vulnerability.


Is there any action customers need to take to protect themselves against this vulnerability?

Customers running affected versions of SCOM (System Center Operations Manager) should update to OMI version 1.8.1-0.


Mitigations:

Is there any action a customer can take to protect against this vulnerability if they are unable to update?

If the Linux machines do not need network listening, OMI incoming ports can be disabled.


Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21334
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Open Management Infrastructure Release Notes (Security Update) Important Remote Code Execution None Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
OMI version 1.8.1-0 Maybe None
System Center Operations Manager (SCOM) 2019 Release Notes (Security Update) Important Remote Code Execution None Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.19.1253.0 Maybe None
System Center Operations Manager (SCOM) 2022 Release Notes (Security Update) Important Remote Code Execution None Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.22.1070.0 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21334 Wei in Kunlun Lab with Cyber KunLun


Wei in Kunlun Lab with Cyber KunLun


CVE-2024-21390 - Microsoft Authenticator Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21390
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Authenticator Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, Attack Vector is Local (AV:L). What does that mean for this vulnerability?

An attacker would have to have local presence on the device through malware or a malicious application to be able to exploit this vulnerability.


According to the CVSS metric, User Interaction is Required (UI:R). What interaction would the user have to do?

The victim will have to close and re-open the Authenticator app for the attacker to exploit this vulnerability.


According to the CVSS metric, Confidentiality and Integrity impact are High and Availability is None (C:H, I:H, A:N). What does that mean for this vulnerability?

Exploitation of this vulnerability could allow an attacker to gain access to multi-factor authentication codes for the victim's accounts, as well as modify or delete accounts in the authenticator app but not prevent the app from launching or running.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21390
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Authenticator Release Notes (Security Update) Important Elevation of Privilege None Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
6.2401.0617 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21390 Anonymous


alirez


Anonymous


CVE-2024-21400 - Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21400
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.0/TemporalScore:8.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.


Is there any action I need to take to be protected from this vulnerability?

Customer must ensure they are running the latest version of az confcom and Kata Image.

Customers who do not have az confcom installed can install the latest version by executing az extension add -n confcom. Customers who are running versions prior to 0.3.3 need to update by executing az extension update -n confcom. For more information, reference:


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

An attacker who successfully exploited this vulnerability could steal credentials and affect resources beyond the security scope managed by Azure Kubernetes Service Confidential Containers (AKSCC).


How could an attacker exploit this vulnerability?

An attacker can access the untrusted AKS Kubernetes node and AKS Confidential Container to take over confidential guests and containers beyond the network stack it might be bound to.


According to the CVSS metric, privileges required is none (PR:N). Does the attacker need to be authenticated?

No. An unauthenticated attacker can move the same workload onto a machine they control, where the attacker is root.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21400
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Kubernetes Service Confidential Containers Release Notes (Security Update) Important Elevation of Privilege None Base: 9.0
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C
0.3.3 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21400 Yuval Avrahami


CVE-2024-21407 - Windows Hyper-V Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21407
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How would an attacker exploit this vulnerability?

This vulnerability would require an authenticated attacker on a guest VM to send specially crafted file operation requests on the VM to hardware resources on the VM which could result in remote code execution on the host server.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21407
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5035858 (Security Update) Critical Remote Code Execution 5034774 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Critical Remote Code Execution 5034767 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Critical Remote Code Execution 5034768 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Critical Remote Code Execution 5034763
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Critical Remote Code Execution
5034763
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Critical Remote Code Execution 5034766 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Critical Remote Code Execution 5034766 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Critical Remote Code Execution 5034765 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Critical Remote Code Execution 5034765 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Critical Remote Code Execution 5034765 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Critical Remote Code Execution 5034765 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Critical Remote Code Execution 5034830 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Critical Remote Code Execution 5034830 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Critical Remote Code Execution 5034819 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Critical Remote Code Execution 5034819 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Critical Remote Code Execution 5034767 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Critical Remote Code Execution 5034767 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Critical Remote Code Execution 5034768 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Critical Remote Code Execution 5034768 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5034770
5034860
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Critical Remote Code Execution 5034770
5034860
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Critical Remote Code Execution 5034769 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21407 chief banana


@australeo


CVE-2024-21408 - Windows Hyper-V Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21408
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Critical Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21408
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5035858 (Security Update) Critical Denial of Service 5034774 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Critical Denial of Service 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Critical Denial of Service 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Critical Denial of Service 5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Critical Denial of Service
5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Critical Denial of Service
5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Critical Denial of Service 5034766 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Critical Denial of Service 5034766 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Critical Denial of Service 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Critical Denial of Service 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Critical Denial of Service 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Critical Denial of Service 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2016 5035855 (Security Update) Critical Denial of Service 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Critical Denial of Service 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Critical Denial of Service 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Critical Denial of Service 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Critical Denial of Service 5034770
5034860
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Critical Denial of Service 5034770
5034860
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Critical Denial of Service 5034769 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21408 HongZhenhao with TianGong Team of Legendsec at Qi'anxin Group


CVE-2024-21419 - Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21419
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.6/TemporalScore:6.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authorized attacker with read/write privileges must send a victim a malicious email, or share the link to a malicious email, and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21419
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.1 5037079 (Security Update) Important Spoofing None Base: 7.6
Temporal: 6.6
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
9.1.27 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21419 Artem with GetHacked Inc.


Omar Eissa


CVE-2024-21427 - Windows Kerberos Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21427
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kerberos Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

The authentication feature could be bypassed as this vulnerability allows impersonation.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21427
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Security Feature Bypass 5034774 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Security Feature Bypass 5034774 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Security Feature Bypass 5034767 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Security Feature Bypass 5034767 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Security Feature Bypass 5034768 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Security Feature Bypass 5034768 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Security Feature Bypass 5034768 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Security Feature Bypass 5034763
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Security Feature Bypass 5034763
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Security Feature Bypass 5034763
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Security Feature Bypass
5034763
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Security Feature Bypass
5034763
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Security Feature Bypass
5034763
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Security Feature Bypass 5034766 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Security Feature Bypass 5034766 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Security Feature Bypass 5034765 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Security Feature Bypass 5034765 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Security Feature Bypass 5034765 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Security Feature Bypass 5034765 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Security Feature Bypass 5034830 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Security Feature Bypass 5034830 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Security Feature Bypass 5034819 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Security Feature Bypass 5034819 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Security Feature Bypass 5034767 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Security Feature Bypass 5034767 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Security Feature Bypass 5034768 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Security Feature Bypass 5034768 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5034770
5034860
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5034770
5034860
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Security Feature Bypass 5034769 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21427 Jo Sutton with Catalyst IT


Charlie Clark and Andrew Schwartz with TrustedSec


Andrew Schwartz with TrustedSec


CVE-2024-21431 - Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21431
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

A hypervisor-protected code integrity (HVCI) security feature bypass vulnerability could exist when Windows incorrectly allows certain kernel-mode pages to be marked as Read, Write, Execute (RWX) even with HVCI enabled. To exploit this vulnerability an attacker could run a specially crafted script at administrator level that exploits a signed driver to bypass code integrity protections in Windows.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21431
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Security Feature Bypass 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Security Feature Bypass 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Security Feature Bypass 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Security Feature Bypass
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Security Feature Bypass
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Security Feature Bypass
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Security Feature Bypass 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Security Feature Bypass 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Security Feature Bypass 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Security Feature Bypass 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Security Feature Bypass 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Security Feature Bypass 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Security Feature Bypass 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Security Feature Bypass 5034769 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21431 Anonymous


CVE-2024-21432 - Windows Update Stack Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21432
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Update Stack Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21432
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21432 Filip Dragović


CVE-2024-21433 - Windows Print Spooler Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21433
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Print Spooler Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21433
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21433 None

CVE-2024-21434 - Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21434
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21434
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2019 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21434 Wen of KunlunLab


CVE-2024-21435 - Windows OLE Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21435
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows OLE Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a specially crafted file to be placed either in an online directory or in a local network location. When a victim runs this file, it loads the malicious DLL.


How could an attacker exploit this vulnerability?

An unauthenticated attacker could exploit the vulnerability by placing a specially crafted file onto an online directory or in a local network location then convincing the user to open it. In a successful attack, this will then load a malicious DLL which could lead to a remote code execution.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21435
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21435 kap0k


CHEN QINGYANG with Topsec Alpha Team


CVE-2024-21436 - Windows Installer Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21436
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Installer Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents.


How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21436
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21436 @sim0nsecurity


CVE-2024-21437 - Windows Graphics Component Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21437
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Graphics Component Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21437
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21437 esakis


CVE-2024-21440 - Microsoft ODBC Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21440
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21440
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Remote Code Execution 5034769 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21440 Anonymous


CVE-2024-21448 - Microsoft Teams for Android Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21448
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Teams for Android Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.0/TemporalScore:4.4
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is information disclosure?

The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local (AV:L) and User Interaction is Required (UI:R), this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and run a malicious application. This could lead to a local attack on the user's device which could leak data.


How do I get the update for Teams for Android?

  1. Tap the Play Store icon on your home screen.
  2. Tap the circular account icon at the top right of the screen.
  3. Tap Manage apps & devices.
  4. Tap Updates available.
  5. Tap the Update button next to the Microsoft Teams app.

Is there a direct link on the web?

Yes: https://play.google.com/store/apps/details?id=com.microsoft.teams


What type of information could be disclosed by this vulnerability?

If an attacker successfully exploited this vulnerability, they can read files from the private directory of the application.


According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?

An authenticated attacker could convince a user to confirm an action through a dialog box.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21448
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Teams for Android Release Notes (Security Update) Important Information Disclosure None Base: 5.0
Temporal: 4.4
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
1.0.0.2024022302 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21448 Dimitrios Valsamaras with Microsoft


CVE-2024-26160 - Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26160
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cloud Files Mini Filter Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26160
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Information Disclosure 5034769 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26160 George Hughey with MSRC Vulnerabilities and Mitigations


CVE-2024-26162 - Microsoft ODBC Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26162
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft ODBC Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26162
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Remote Code Execution 5034769 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26162 Anonymous


CVE-2024-26166 - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26166
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26166
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Remote Code Execution 5034774 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution 5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Remote Code Execution
5034763
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Remote Code Execution 5034766 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Remote Code Execution 5034765 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Remote Code Execution 5034795
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Remote Code Execution 5034831
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Remote Code Execution 5034830 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Remote Code Execution 5034819 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Remote Code Execution 5034767 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Remote Code Execution 5034768 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Remote Code Execution 5034770
5034860
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Remote Code Execution 5034769 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26166 Anonymous


CVE-2024-26169 - Windows Error Reporting Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26169
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Error Reporting Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26169
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26169 Naceri with MSRC Vulnerabilities & Mitigations


CVE-2024-26170 - Windows Composite Image File System (CimFS) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26170
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Composite Image File System (CimFS) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26170
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26170 Anonymous


CVE-2024-26173 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26173
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26173
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26173 Mateusz Jurczyk with Google Project Zero


CVE-2024-26174 - Windows Kernel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26174
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is values of registry keys the attacker does not have permissions to view.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26174
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Information Disclosure 5034774 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Information Disclosure 5034774 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Information Disclosure 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Information Disclosure 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Information Disclosure 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Information Disclosure 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Information Disclosure 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Information Disclosure 5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Information Disclosure 5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Information Disclosure 5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Information Disclosure
5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Information Disclosure
5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Information Disclosure
5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Information Disclosure 5034766 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Information Disclosure 5034766 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Information Disclosure 5034795
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Information Disclosure 5034795
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Information Disclosure 5034795
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Information Disclosure 5034795
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Information Disclosure 5034831
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Information Disclosure 5034831
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Information Disclosure 5034830 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Information Disclosure 5034830 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Information Disclosure 5034819 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Information Disclosure 5034819 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Information Disclosure 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Information Disclosure 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Information Disclosure 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Information Disclosure 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Information Disclosure 5034770
5034860
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Information Disclosure 5034770
5034860
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Information Disclosure 5034769 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26174 Mateusz Jurczyk with Google Project Zero


CVE-2024-26176 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26176
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26176
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26176 Mateusz Jurczyk with Google Project Zero


CVE-2024-26177 - Windows Kernel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26177
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is values of registry keys the attacker does not have permissions to view.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26177
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Information Disclosure 5034774 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Information Disclosure 5034774 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Information Disclosure 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Information Disclosure 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Information Disclosure 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Information Disclosure 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Information Disclosure 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Information Disclosure 5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Information Disclosure 5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Information Disclosure 5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Information Disclosure
5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Information Disclosure
5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Information Disclosure
5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Information Disclosure 5034766 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Information Disclosure 5034766 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Information Disclosure 5034795
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Information Disclosure 5034795
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Information Disclosure 5034795
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Information Disclosure 5034795
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Information Disclosure 5034831
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Information Disclosure 5034831
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Information Disclosure 5034830 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Information Disclosure 5034830 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Information Disclosure 5034819 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Information Disclosure 5034819 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Information Disclosure 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Information Disclosure 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Information Disclosure 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Information Disclosure 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Information Disclosure 5034770
5034860
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Information Disclosure 5034770
5034860
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Information Disclosure 5034769 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26177 Mateusz Jurczyk with Google Project Zero


CVE-2024-26178 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26178
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26178
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Elevation of Privilege 5034774 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Elevation of Privilege 5034766 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Elevation of Privilege 5034765 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Elevation of Privilege 5034795
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Elevation of Privilege 5034831
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Elevation of Privilege 5034830 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Elevation of Privilege 5034819 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Elevation of Privilege 5034770
5034860
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Elevation of Privilege 5034769 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26178 Mateusz Jurczyk with Google Project Zero


CVE-2024-26181 - Windows Kernel Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26181
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26181
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Denial of Service 5034774 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Denial of Service 5034774 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Denial of Service 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Denial of Service 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Denial of Service 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Denial of Service 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Denial of Service 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Denial of Service 5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Denial of Service 5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Denial of Service 5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Denial of Service
5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Denial of Service
5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Denial of Service
5034763
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for ARM64-based Systems 5035854 (Security Update) Important Denial of Service 5034766 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Denial of Service 5034766 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Denial of Service 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Denial of Service 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Denial of Service 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Denial of Service 5034765 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows Server 2008 for 32-bit Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Denial of Service 5034795
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Denial of Service 5034795
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Denial of Service 5034795
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Denial of Service 5034795
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Denial of Service 5034831
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Denial of Service 5034831
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Denial of Service 5034830 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Denial of Service 5034830 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Denial of Service 5034819 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Denial of Service 5034819 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Denial of Service 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Denial of Service 5034767 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Denial of Service 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Denial of Service 5034768 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Denial of Service 5034770
5034860
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Denial of Service 5034770
5034860
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Denial of Service 5034769 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26181 Mateusz Jurczyk with Google Project Zero


CVE-2024-26182 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26182
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26182
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for ARM64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege 5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for ARM64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Elevation of Privilege
5034763
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4170
Yes 5035845
Windows Server 2016 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Elevation of Privilege 5034767 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Elevation of Privilege 5034768 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.5576 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26182 Mateusz Jurczyk with Google Project Zero


CVE-2024-26185 - Windows Compressed Folder Tampering Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26185
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Compressed Folder Tampering Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires that a user open a specially crafted file.

  • In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.

An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Tampering

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26185
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5035853 (Security Update) Important Tampering 5034765 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Tampering 5034765 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5035853 (Security Update) Important Tampering 5034765 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Tampering 5034765 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22631.3296 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26185 Terrynini with DEVCORE


CVE-2023-28746 - Intel: CVE-2023-28746 Register File Data Sampling (RFDS)

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-28746
MITRE
NVD

Issuing CNA: Intel Corporation

CVE Title: Intel: CVE-2023-28746 Register File Data Sampling (RFDS)
CVSS:
None
Executive Summary:

This CVE was assigned by Intel. Please see CVE-2023-28746 on CVE.org for more information.


FAQ:

Why is this Intel CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in certain processor models offered by Intel. The mitigation for this vulnerability requires a firmware update, and a corresponding Windows updates enables the mitigation. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and are not vulnerable to the issue when paired with the firmware update. Please see the following for more information: https://www.intel.com/content/www/us/en/developer/articles/technical/softwaresecurity-guidance/advisory-guidance/register-file-data-sampling.html


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-28746
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5035858 (Security Update) Important Information Disclosure 5034774 Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20526 Yes None
Windows 10 for x64-based Systems 5035858 (Security Update) Important Information Disclosure 5034774 Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20526 Yes None
Windows 10 Version 1607 for 32-bit Systems 5035855 (Security Update) Important Information Disclosure 5034767 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6796 Yes None
Windows 10 Version 1607 for x64-based Systems 5035855 (Security Update) Important Information Disclosure 5034767 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6796 Yes None
Windows 10 Version 1809 for 32-bit Systems 5035849 (Security Update) Important Information Disclosure 5034768 Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.5576 Yes None
Windows 10 Version 1809 for x64-based Systems 5035849 (Security Update) Important Information Disclosure 5034768 Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.5576 Yes None
Windows 10 Version 21H2 for 32-bit Systems 5035845 (Security Update) Important Information Disclosure 5034763
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19044.4170
Yes 5035845
Windows 10 Version 21H2 for x64-based Systems 5035845 (Security Update) Important Information Disclosure 5034763
Base: N/A
Temporal: N/A
Vector: N/A
10.0.19044.4170
Yes 5035845
Windows 10 Version 22H2 for 32-bit Systems 5035845 (Security Update) Important Information Disclosure
5034763
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.4170
Yes 5035845
Windows 10 Version 22H2 for x64-based Systems 5035845 (Security Update) Important Information Disclosure
5034763
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.4170
Yes 5035845
Windows 11 version 21H2 for x64-based Systems 5035854 (Security Update) Important Information Disclosure 5034766 Base: N/A
Temporal: N/A
Vector: N/A
10.0.22000.2836 Yes None
Windows 11 Version 22H2 for x64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: N/A
Temporal: N/A
Vector: N/A
10.0.22621.3296 Yes None
Windows 11 Version 23H2 for x64-based Systems 5035853 (Security Update) Important Information Disclosure 5034765 Base: N/A
Temporal: N/A
Vector: N/A
10.0.22631.3296 Yes None
Windows Server 2008 for x64-based Systems Service Pack 2 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Information Disclosure 5034795
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5035920 (Monthly Rollup)
5035933 (Security Only)
Important Information Disclosure 5034795
Base: N/A
Temporal: N/A
Vector: N/A
6.0.6003.22567
Yes 5035920
5035933
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Information Disclosure 5034831
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.27017 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5035888 (Monthly Rollup)
5035919 (Security Only)
Important Information Disclosure 5034831
Base: N/A
Temporal: N/A
Vector: N/A
6.1.7601.27017 Yes None
Windows Server 2012 5035930 (Monthly Rollup) Important Information Disclosure 5034830 Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.24768 Yes None
Windows Server 2012 (Server Core installation) 5035930 (Monthly Rollup) Important Information Disclosure 5034830 Base: N/A
Temporal: N/A
Vector: N/A
6.2.9200.24768 Yes None
Windows Server 2012 R2 5035885 (Monthly Rollup) Important Information Disclosure 5034819 Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.21871 Yes None
Windows Server 2012 R2 (Server Core installation) 5035885 (Monthly Rollup) Important Information Disclosure 5034819 Base: N/A
Temporal: N/A
Vector: N/A
6.3.9600.21871 Yes None
Windows Server 2016 5035855 (Security Update) Important Information Disclosure 5034767 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6796 Yes None
Windows Server 2016 (Server Core installation) 5035855 (Security Update) Important Information Disclosure 5034767 Base: N/A
Temporal: N/A
Vector: N/A
10.0.14393.6796 Yes None
Windows Server 2019 5035849 (Security Update) Important Information Disclosure 5034768 Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.5576 Yes None
Windows Server 2019 (Server Core installation) 5035849 (Security Update) Important Information Disclosure 5034768 Base: N/A
Temporal: N/A
Vector: N/A
10.0.17763.5576 Yes None
Windows Server 2022 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Information Disclosure 5034770
5034860
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022 (Server Core installation) 5035857 (Security Update)
5035959 (SecurityHotpatchUpdate)
Important Information Disclosure 5034770
5034860
Base: N/A
Temporal: N/A
Vector: N/A
10.0.20348.2340
10.0.20348.2333
Yes None
Windows Server 2022, 23H2 Edition (Server Core installation) 5035856 (Security Update) Important Information Disclosure 5034769 Base: N/A
Temporal: N/A
Vector: N/A
10.0.25398.763 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-28746 None

CVE-2024-26204 - Outlook for Android Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26204
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Outlook for Android Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is file content.


Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26204
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Outlook for Android Release Notes (Security Update) Important Information Disclosure None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
4.2404.0 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26204 Dimitrios Valsamaras with Microsoft


CVE-2024-26165 - Visual Studio Code Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26165
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Visual Studio Code Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Mar-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26165
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Visual Studio Code Release Notes (Security Update) Important Elevation of Privilege None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.XX.X Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26165 None

CVE-2024-26167 - Microsoft Edge for Android Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26167
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge for Android Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.3/TemporalScore:3.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires that a user open a specially crafted file.

  • In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.

An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


According to the CVSS metric, Confidentiality and Integrity are rated as Low and Availability is None (C:L, I:L, A:N). What does that mean for this vulnerability?

An attacker is only able to comprise files that they were allowed access to as part of their initial privilege but cannot affect the availability of the browser.


Is the update for Edge for Android currently available?

The security update for Edge for Android is not immediately available. The update will be released as soon as possible, and when it is available, customers will be notified via a revision to this CVE information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-24    

Information published.


1.1    07-Mar-24    

FAQ added to explain that the Edge for Android update is not immediately available. The update will be released as soon as possible, and when it is available, customers will be notified via a revision to this CVE information.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26167
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge for Android Unknown Unknown None Base: 4.3
Temporal: 3.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26167 Hafiizh with https://www.linkedin.com/in/hafiizh-7aa6bb31/


CVE-2024-2173 - Chromium: CVE-2024-2173 Out of bounds memory access in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-2173
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-2173 Out of bounds memory access in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 122.0.2365.80 3/7/2024 122.0.6261.111/.112

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-2173
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
122.0.2365.80 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-2173 None

CVE-2024-2174 - Chromium: CVE-2024-2174 Inappropriate implementation in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-2174
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-2174 Inappropriate implementation in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 122.0.2365.80 3/7/2024 122.0.6261.111/.112

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-2174
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
122.0.2365.80 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-2174 None

CVE-2024-2176 - Chromium: CVE-2024-2176 Use after free in FedCM

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-2176
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-2176 Use after free in FedCM
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Microsoft Edge Channel Microsoft Edge Version Date Released Based on Chromium Version
Stable 122.0.2365.80 3/7/2024 122.0.6261.111/.112

Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Mar-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-2176
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
122.0.2365.80 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-2176 None