This report contains detail for the following vulnerabilities:
CVE Issued by | Tag | CVE ID | CVE Title |
---|---|---|---|
Microsoft | .NET and Visual Studio | CVE-2024-38168 | .NET and Visual Studio Denial of Service Vulnerability |
Microsoft | .NET and Visual Studio | CVE-2024-38167 | .NET and Visual Studio Information Disclosure Vulnerability |
Microsoft | Azure Connected Machine Agent | CVE-2024-38162 | Azure Connected Machine Agent Elevation of Privilege Vulnerability |
Microsoft | Azure Connected Machine Agent | CVE-2024-38098 | Azure Connected Machine Agent Elevation of Privilege Vulnerability |
Microsoft | Azure CycleCloud | CVE-2024-38195 | Azure CycleCloud Remote Code Execution Vulnerability |
Microsoft | Azure Health Bot | CVE-2024-38109 | Azure Health Bot Elevation of Privilege Vulnerability |
Microsoft | Azure IoT SDK | CVE-2024-38158 | Azure IoT SDK Remote Code Execution Vulnerability |
Microsoft | Azure IoT SDK | CVE-2024-38157 | Azure IoT SDK Remote Code Execution Vulnerability |
Microsoft | Azure Stack | CVE-2024-38108 | Azure Stack Hub Spoofing Vulnerability |
Microsoft | Azure Stack | CVE-2024-38201 | Azure Stack Hub Elevation of Privilege Vulnerability |
Microsoft | Line Printer Daemon Service (LPD) | CVE-2024-38199 | Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-26900 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39473 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39474 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42074 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42073 | Unknown |
security@golang.org | Mariner | CVE-2023-29402 | Unknown |
cve@mitre.org | Mariner | CVE-2007-4559 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39480 | Unknown |
cve@mitre.org | Mariner | CVE-2022-36648 | Unknown |
security@golang.org | Mariner | CVE-2023-29404 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-36288 | Unknown |
cve@mitre.org | Mariner | CVE-2019-20907 | Unknown |
secalert@redhat.com | Mariner | CVE-2019-3816 | Unknown |
2499f714-1537-4658-8207-48ae4bb9eae9 | Mariner | CVE-2024-0853 | Unknown |
report@snyk.io | Mariner | CVE-2021-23336 | Unknown |
cve@mitre.org | Mariner | CVE-2017-17522 | Unknown |
2499f714-1537-4658-8207-48ae4bb9eae9 | Mariner | CVE-2024-2004 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42075 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-38662 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42078 | Unknown |
2499f714-1537-4658-8207-48ae4bb9eae9 | Mariner | CVE-2024-2398 | Unknown |
cve@mitre.org | Mariner | CVE-2017-18207 | Unknown |
cve@mitre.org | Mariner | CVE-2019-9674 | Unknown |
secalert@redhat.com | Mariner | CVE-2021-4206 | Unknown |
secalert@redhat.com | Mariner | CVE-2021-4207 | Unknown |
secalert@redhat.com | Mariner | CVE-2022-26353 | Unknown |
cna@python.org | Mariner | CVE-2024-0397 | Unknown |
secalert@redhat.com | Mariner | CVE-2021-3929 | Unknown |
secalert@redhat.com | Mariner | CVE-2021-4158 | Unknown |
cve@mitre.org | Mariner | CVE-2022-35414 | Unknown |
security@golang.org | Mariner | CVE-2023-45288 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-38571 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42077 | Unknown |
secalert@redhat.com | Mariner | CVE-2023-3354 | Unknown |
secalert@redhat.com | Mariner | CVE-2022-3872 | Unknown |
secalert@redhat.com | Mariner | CVE-2022-4144 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-37298 | Unknown |
cve@mitre.org | Mariner | CVE-2024-39331 | Unknown |
cve@mitre.org | Mariner | CVE-2021-43565 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39277 | Unknown |
secalert@redhat.com | Mariner | CVE-2019-3833 | Unknown |
secalert@redhat.com | Mariner | CVE-2024-6655 | Unknown |
2499f714-1537-4658-8207-48ae4bb9eae9 | Mariner | CVE-2024-2466 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-38780 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39495 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-40902 | Unknown |
security-advisories@github.com | Mariner | CVE-2024-41110 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39292 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39482 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39484 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39476 | Unknown |
cve@mitre.org | Mariner | CVE-2024-23722 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42082 | Unknown |
security@apache.org | Mariner | CVE-2024-40898 | Unknown |
cve@mitre.org | Mariner | CVE-2022-29526 | Unknown |
secalert@redhat.com | Mariner | CVE-2022-26354 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2022-48788 | Unknown |
secalert@redhat.com | Mariner | CVE-2022-2962 | Unknown |
secalert@redhat.com | Mariner | CVE-2022-3165 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-38583 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42080 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42076 | Unknown |
security@golang.org | Mariner | CVE-2022-41722 | Unknown |
cve@mitre.org | Mariner | CVE-2024-38428 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42068 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39493 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42070 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39489 | Unknown |
security@hashicorp.com | Mariner | CVE-2024-6257 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42237 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42071 | Unknown |
cve@mitre.org | Mariner | CVE-2024-37371 | Unknown |
cve@mitre.org | Mariner | CVE-2024-37370 | Unknown |
cve@mitre.org | Mariner | CVE-2024-26461 | Unknown |
security@hashicorp.com | Mariner | CVE-2024-6104 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42072 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2022-48841 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39485 | Unknown |
cve@mitre.org | Mariner | CVE-2023-52340 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-42083 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39483 | Unknown |
416baaa9-dc9f-4396-8d5f-8c081fb06d67 | Mariner | CVE-2024-39475 | Unknown |
secalert@redhat.com | Mariner | CVE-2021-3750 | Unknown |
secalert@redhat.com | Mariner | CVE-2022-0358 | Unknown |
Microsoft | Microsoft Bluetooth Driver | CVE-2024-38123 | Windows Bluetooth Driver Information Disclosure Vulnerability |
Microsoft | Microsoft Copilot Studio | CVE-2024-38206 | Microsoft Copilot Studio Information Disclosure Vulnerability |
Microsoft | Microsoft Dynamics | CVE-2024-38166 | Microsoft Dynamics 365 Cross-site Scripting Vulnerability |
Microsoft | Microsoft Dynamics | CVE-2024-38211 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-7256 | Chromium: CVE-2024-7256 Insufficient data validation in Dawn |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-7536 | Chromium: CVE-2024-7550 Type Confusion in V8 |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-6990 | Chromium: CVE-2024-6990 Uninitialized Use in Dawn |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-7255 | Chromium: CVE-2024-7255 Out of bounds read in WebTransport |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-7534 | Chromium: CVE-2024-7535 Inappropriate implementation in V8 |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-7532 | Chromium: CVE-2024-7533 Use after free in Sharing |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-7550 | Chromium: CVE-2024-7532 Out of bounds memory access in ANGLE |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-7535 | Chromium: CVE-2024-7536 Use after free in WebAudio |
Chrome | Microsoft Edge (Chromium-based) | CVE-2024-7533 | Chromium: CVE-2024-7534 Heap buffer overflow in Layout |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2024-38218 | Microsoft Edge (HTML-based) Memory Corruption Vulnerability |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2024-38219 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability |
Microsoft | Microsoft Edge (Chromium-based) | CVE-2024-38222 | Microsoft Edge (Chromium-based) Information Disclosure Vulnerability |
Microsoft | Microsoft Local Security Authority Server (lsasrv) | CVE-2024-38118 | Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability |
Microsoft | Microsoft Local Security Authority Server (lsasrv) | CVE-2024-38122 | Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability |
Microsoft | Microsoft Office | CVE-2024-38200 | Microsoft Office Spoofing Vulnerability |
Microsoft | Microsoft Office | CVE-2024-38084 | Microsoft OfficePlus Elevation of Privilege Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2024-38172 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Excel | CVE-2024-38170 | Microsoft Excel Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Outlook | CVE-2024-38173 | Microsoft Outlook Remote Code Execution Vulnerability |
Microsoft | Microsoft Office PowerPoint | CVE-2024-38171 | Microsoft PowerPoint Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Project | CVE-2024-38189 | Microsoft Project Remote Code Execution Vulnerability |
Microsoft | Microsoft Office Visio | CVE-2024-38169 | Microsoft Office Visio Remote Code Execution Vulnerability |
Microsoft | Microsoft Streaming Service | CVE-2024-38134 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability |
Microsoft | Microsoft Streaming Service | CVE-2024-38144 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability |
Microsoft | Microsoft Streaming Service | CVE-2024-38125 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability |
Microsoft | Microsoft Teams | CVE-2024-38197 | Microsoft Teams for iOS Spoofing Vulnerability |
Microsoft | Microsoft WDAC OLE DB provider for SQL | CVE-2024-38152 | Windows OLE Remote Code Execution Vulnerability |
Microsoft | Microsoft Windows DNS | CVE-2024-37968 | Windows DNS Spoofing Vulnerability |
Microsoft | Reliable Multicast Transport Driver (RMCAST) | CVE-2024-38140 | Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability |
Microsoft | Windows Ancillary Function Driver for WinSock | CVE-2024-38141 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
Microsoft | Windows Ancillary Function Driver for WinSock | CVE-2024-38193 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability |
Microsoft | Windows App Installer | CVE-2024-38177 | Windows App Installer Spoofing Vulnerability |
Microsoft | Windows Clipboard Virtual Channel Extension | CVE-2024-38131 | Clipboard Virtual Channel Extension Remote Code Execution Vulnerability |
Microsoft | Windows Cloud Files Mini Filter Driver | CVE-2024-38215 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Common Log File System Driver | CVE-2024-38196 | Windows Common Log File System Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Compressed Folder | CVE-2024-38165 | Windows Compressed Folder Tampering Vulnerability |
Microsoft | Windows Deployment Services | CVE-2024-38138 | Windows Deployment Services Remote Code Execution Vulnerability |
Microsoft | Windows DWM Core Library | CVE-2024-38150 | Windows DWM Core Library Elevation of Privilege Vulnerability |
Microsoft | Windows DWM Core Library | CVE-2024-38147 | Microsoft DWM Core Library Elevation of Privilege Vulnerability |
Microsoft | Windows Initial Machine Configuration | CVE-2024-38223 | Windows Initial Machine Configuration Elevation of Privilege Vulnerability |
Microsoft | Windows IP Routing Management Snapin | CVE-2024-38114 | Windows IP Routing Management Snapin Remote Code Execution Vulnerability |
Microsoft | Windows IP Routing Management Snapin | CVE-2024-38116 | Windows IP Routing Management Snapin Remote Code Execution Vulnerability |
Microsoft | Windows IP Routing Management Snapin | CVE-2024-38115 | Windows IP Routing Management Snapin Remote Code Execution Vulnerability |
Microsoft | Windows Kerberos | CVE-2024-29995 | Windows Kerberos Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2024-38151 | Windows Kernel Information Disclosure Vulnerability |
Microsoft | Windows Kernel | CVE-2024-38133 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2024-38127 | Windows Hyper-V Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2024-38153 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel | CVE-2024-38106 | Windows Kernel Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel-Mode Drivers | CVE-2024-38187 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel-Mode Drivers | CVE-2024-38191 | Kernel Streaming Service Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel-Mode Drivers | CVE-2024-38184 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel-Mode Drivers | CVE-2024-38186 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Kernel-Mode Drivers | CVE-2024-38185 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability |
Microsoft | Windows Layer-2 Bridge Network Driver | CVE-2024-38146 | Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability |
Microsoft | Windows Layer-2 Bridge Network Driver | CVE-2024-38145 | Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability |
Microsoft | Windows Mark of the Web (MOTW) | CVE-2024-38213 | Windows Mark of the Web Security Feature Bypass Vulnerability |
Microsoft | Windows Mobile Broadband | CVE-2024-38161 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability |
Microsoft | Windows Network Address Translation (NAT) | CVE-2024-38132 | Windows Network Address Translation (NAT) Denial of Service Vulnerability |
Microsoft | Windows Network Address Translation (NAT) | CVE-2024-38126 | Windows Network Address Translation (NAT) Denial of Service Vulnerability |
Microsoft | Windows Network Virtualization | CVE-2024-38160 | Windows Network Virtualization Remote Code Execution Vulnerability |
Microsoft | Windows Network Virtualization | CVE-2024-38159 | Windows Network Virtualization Remote Code Execution Vulnerability |
Microsoft | Windows NT OS Kernel | CVE-2024-38135 | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability |
Microsoft | Windows NTFS | CVE-2024-38117 | NTFS Elevation of Privilege Vulnerability |
Microsoft | Windows Power Dependency Coordinator | CVE-2024-38107 | Windows Power Dependency Coordinator Elevation of Privilege Vulnerability |
Microsoft | Windows Print Spooler Components | CVE-2024-38198 | Windows Print Spooler Elevation of Privilege Vulnerability |
Microsoft | Windows Resource Manager | CVE-2024-38137 | Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability |
Microsoft | Windows Resource Manager | CVE-2024-38136 | Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2024-38130 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2024-38128 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2024-38154 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2024-38121 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2024-38214 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability |
Microsoft | Windows Routing and Remote Access Service (RRAS) | CVE-2024-38120 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability |
Microsoft | Windows Scripting | CVE-2024-38178 | Scripting Engine Memory Corruption Vulnerability |
Red Hat, Inc. | Windows Secure Boot | CVE-2022-3775 | Redhat: CVE-2022-3775 grub2 - Heap based out-of-bounds write when rendering certain Unicode sequences |
Red Hat, Inc. | Windows Secure Boot | CVE-2023-40547 | Redhat: CVE-2023-40547 Shim - RCE in HTTP boot support may lead to secure boot bypass |
Red Hat, Inc. | Windows Secure Boot | CVE-2022-2601 | Redhat: CVE-2022-2601 grub2 - Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass |
Microsoft | Windows Secure Kernel Mode | CVE-2024-21302 | Windows Secure Kernel Mode Elevation of Privilege Vulnerability |
Microsoft | Windows Secure Kernel Mode | CVE-2024-38142 | Windows Secure Kernel Mode Elevation of Privilege Vulnerability |
Microsoft | Windows Security Center | CVE-2024-38155 | Security Center Broker Information Disclosure Vulnerability |
Microsoft | Windows SmartScreen | CVE-2024-38180 | Windows SmartScreen Security Feature Bypass Vulnerability |
Microsoft | Windows TCP/IP | CVE-2024-38063 | Windows TCP/IP Remote Code Execution Vulnerability |
Microsoft | Windows Transport Security Layer (TLS) | CVE-2024-38148 | Windows Secure Channel Denial of Service Vulnerability |
Microsoft | Windows Update Stack | CVE-2024-38202 | Windows Update Stack Elevation of Privilege Vulnerability |
Microsoft | Windows Update Stack | CVE-2024-38163 | Windows Update Stack Elevation of Privilege Vulnerability |
Microsoft | Windows WLAN Auto Config Service | CVE-2024-38143 | Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-2601
MITRE NVD Issuing CNA: Red Hat, Inc. |
CVE Title: Redhat: CVE-2022-2601 grub2 - Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
CVSS: CVSS:3.1 Highest BaseScore:8.6/TemporalScore:8.6
Executive Summary: None FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Why is this Redhat CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in the Linux GRUB2 boot loader, a boot loader designed to support Secure Boot on systems that are running Linux. It is being documented in the Security Update Guide to announce that the latest builds of Windows are no longer vulnerable to this security feature bypass using the Linux GRUB2 boot loader. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. Will this update affect my ability to boot Linux after applying this update? To address this security issue, Windows will apply a Secure Boot Advanced Targeting (SBAT) update to block vulnerable Linux boot loaders that could have an impact on Windows security. The SBAT value is not applied to dual-boot systems that boot both Windows and Linux and should not affect these systems. You might find that older Linux distribution ISOs will not boot. If this occurs, work with your Linux vendor to get an update. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2022-2601 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | grub2 (CBL-Mariner) | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
2.06-14 | Unknown | None |
Azure Linux 3.0 x64 | grub2 (CBL-Mariner) | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
2.06-14 | Unknown | None |
CBL Mariner 1.0 ARM | grub2 (CBL-Mariner) | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
2.06~rc1-9 | Unknown | None |
CBL Mariner 1.0 x64 | grub2 (CBL-Mariner) | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
2.06~rc1-9 | Unknown | None |
CBL Mariner 2.0 ARM | grub2 (CBL-Mariner) | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
2.06-8 | Unknown | None |
CBL Mariner 2.0 x64 | grub2 (CBL-Mariner) | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
2.06-8 | Unknown | None |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Security Feature Bypass | 5040448 | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Security Feature Bypass | 5040448 | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Security Feature Bypass | 5040434 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Security Feature Bypass | 5040434 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Security Feature Bypass | 5040430 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Security Feature Bypass | 5040430 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Security Feature Bypass | 5040430 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Security Feature Bypass | 5040427 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Security Feature Bypass | 5040427 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Security Feature Bypass | 5040427 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Security Feature Bypass | 5040427 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Security Feature Bypass | 5040427 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Security Feature Bypass | 5040427 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Security Feature Bypass | 5040431 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Security Feature Bypass | 5040431 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Security Feature Bypass | 5040442 | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Security Feature Bypass | 5040442 | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Security Feature Bypass | 5040442 | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Security Feature Bypass | 5040442 | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Security Feature Bypass | 5040435 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Security Feature Bypass | 5040435 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Security Feature Bypass | 5040485 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Security Feature Bypass | 5040485 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Security Feature Bypass | 5040456 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Security Feature Bypass | 5040456 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Security Feature Bypass | 5040434 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Security Feature Bypass | 5040434 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Security Feature Bypass | 5040430 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Security Feature Bypass | 5040430 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Security Feature Bypass | 5040437 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Security Feature Bypass | 5040437 |
Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Security Feature Bypass | 5040438 | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2022-2601 | Zhang Boyang |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38108
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Stack Hub Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.3/TemporalScore:8.1
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? A cross-site scripting vulnerability existed in virtual public IP address that impacted related endpoints. For more information on the impacted virtual public IP address, see here: What is IP address 168.63.129.16? | Microsoft Learn. An unauthenticated attacker could exploit this vulnerability by getting the victim to load malicious code into their web browser on the virtual machine, allowing the attacker to leverage an implicit identity of the virtual machine. The victim's web browser then would determine which host endpoints are accessible. According to CVSS metrics the user interaction is required (UI:R). What interaction would a user have to do? A user (victim) logged on to a virtual machine would need to be tricked for the virtual machine to explicitly download and execute a malicious code in their web browser. According to the CVSS metric, the successful exploitation of this vulnerability could lead to a scope change (S:C). What does this mean for this vulnerability? By sending a specially crafted request to the vulnerable virtual public IP address, the attacker is able to load malicious code into a victim's browser without having any direct access or connection. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38108 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Stack Hub | Release Notes (Security Update) | Important | Spoofing | None | Base: 9.3 Temporal: 8.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C |
1.2311.1.22 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38108 | Felix Boulet with Centre gouvernemental de cyberdéfense (CGCD) Mathieu Fiore Laroche with Centre gouvernemental de cyberdéfense (CGCD) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38123
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Bluetooth Driver Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.4/TemporalScore:3.9
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? Exploiting this vulnerability could allow the disclosure of certain kernel memory content. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38123 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Information Disclosure | 5040435 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Information Disclosure | 5040435 |
Base: 4.4 Temporal: 3.9 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
CVE ID | Acknowledgements |
CVE-2024-38123 | Microsoft Offensive Research & Security Engineering (MORSE) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38159
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Network Virtualization Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.1/TemporalScore:7.9
Executive Summary: None FAQ: According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability? To successfully exploit this vulnerability, an attacker or the targeted user would need to achieve a high level of control over a machine, as the attack requires access to processes typically restricted from average users. Essentially, the exploitation necessitates elevated privileges on the compromised machine due to the requirement of manipulating processes beyond the reach of standard user permissions. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by taking advantage of the unchecked return value in the wnv.sys component of Windows Server 2016. By manipulating the content of the Memory Descriptor List (MDL), the attacker could cause unauthorized memory writes or even free a valid block currently in use, leading to a critical guest-to-host escape. According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to the attacker gaining the ability to interact with other tenant’s applications and content. Mitigations: The following mitigating factors might be helpful in your situation:
Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38159 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
CVE ID | Acknowledgements |
CVE-2024-38159 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38160
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Network Virtualization Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.1/TemporalScore:7.9
Executive Summary: None FAQ: According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to the attacker gaining the ability to interact with other tenant’s applications and content. According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability? To successfully exploit this vulnerability, an attacker or the targeted user would need to achieve a high level of control over a machine, as the attack requires access to processes typically restricted from average users. Essentially, the exploitation necessitates elevated privileges on the compromised machine due to the requirement of manipulating processes beyond the reach of standard user permissions. How could an attacker exploit this vulnerability? An attacker could exploit the vulnerability by taking advantage of the unchecked return value in the wnv.sys component of Windows Server 2016. By manipulating the content of the Memory Descriptor List (MDL), the attacker could cause unauthorized memory writes or even free a valid block currently in use, leading to a critical guest-to-host escape. Mitigations: The following mitigating factors might be helpful in your situation:
Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38160 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
CVE ID | Acknowledgements |
CVE-2024-38160 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38161
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38161 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5040430 (Security Update) | Important | Remote Code Execution | 5039217 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 1809 for ARM64-based Systems | 5040430 (Security Update) | Important | Remote Code Execution | 5039217 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 1809 for x64-based Systems | 5040430 (Security Update) | Important | Remote Code Execution | 5039217 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 21H2 for 32-bit Systems | 5040427 (Security Update) | Important | Remote Code Execution | 5039211 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 21H2 for ARM64-based Systems | 5040427 (Security Update) | Important | Remote Code Execution | 5039211 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 21H2 for x64-based Systems | 5040427 (Security Update) | Important | Remote Code Execution | 5039211 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for 32-bit Systems | 5040427 (Security Update) | Important | Remote Code Execution | 5039211 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for ARM64-based Systems | 5040427 (Security Update) | Important | Remote Code Execution | 5039211 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for x64-based Systems | 5040427 (Security Update) | Important | Remote Code Execution | 5039211 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 11 version 21H2 for ARM64-based Systems | 5040431 (Security Update) | Important | Remote Code Execution | 5039213 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3079 |
Yes | 5040431 |
Windows 11 version 21H2 for x64-based Systems | 5040431 (Security Update) | Important | Remote Code Execution | 5039213 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3079 |
Yes | 5040431 |
Windows 11 Version 22H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Remote Code Execution | 5039212 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 22H2 for x64-based Systems | 5040442 (Security Update) | Important | Remote Code Execution | 5039212 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Remote Code Execution | 5039212 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for x64-based Systems | 5040442 (Security Update) | Important | Remote Code Execution | 5039212 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
Windows Server 2019 | 5040430 (Security Update) | Important | Remote Code Execution | 5039217 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows Server 2019 (Server Core installation) | 5040430 (Security Update) | Important | Remote Code Execution | 5039217 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
CVE ID | Acknowledgements |
CVE-2024-38161 | Wen with CyberKunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38167
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET and Visual Studio Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited the vulnerability could read targeted email messages. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of this vulnerability requires that a user trigger the payload in the application. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38167 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 8.0 | 5042132 (Security Update) | Important | Information Disclosure | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
8.0.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.10 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
17.10.6 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
17.6.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Information Disclosure | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
17.8.13 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38167 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38168
MITRE NVD Issuing CNA: Microsoft |
CVE Title: .NET and Visual Studio Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38168 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
.NET 8.0 | 5042132 (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
8.0.8 | Maybe | None |
Microsoft Visual Studio 2022 version 17.10 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
17.10.6 | Maybe | None |
Microsoft Visual Studio 2022 version 17.6 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
17.6.18 | Maybe | None |
Microsoft Visual Studio 2022 version 17.8 | Release Notes (Security Update) | Important | Denial of Service | None | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
17.8.13 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38168 | Brennan Conroy of Microsoft Corporation |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38172
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38172 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.88.24081116 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38172 | an0nym0us |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38178
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Scripting Engine Memory Corruption Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.0
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires an authenticated client to click a link in order for an unauthenticated attacker to initiate remote code execution. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to first prepare the target so that it uses Edge in Internet Explorer Mode. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2024-38178 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) 5041770 (IE Cumulative) |
Important | Remote Code Execution | 5040456 5040426 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22134 1.001 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) 5041770 (IE Cumulative) |
Important | Remote Code Execution | 5040456 5040426 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22134 1.001 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Remote Code Execution | 5040438 | Base: 7.5 Temporal: 7.0 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38178 | AhnLab and National Cyber Security Center(NCSC), Republic of Korea AhnLab National Cyber Security Center(NCSC), Republic of Korea |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38184
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level or a High Integrity Level. Please refer to AppContainer isolation and Mandatory Integrity Control for more information. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38184 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows 10 Version 1607 for x64-based Systems | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows 10 Version 1809 for 32-bit Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 1809 for ARM64-based Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 1809 for x64-based Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 21H2 for 32-bit Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 21H2 for ARM64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 21H2 for x64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for 32-bit Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for ARM64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for x64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 11 version 21H2 for ARM64-based Systems | 5040431 (Security Update) | Important | Elevation of Privilege | 5039213 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3079 |
Yes | 5040431 |
Windows 11 version 21H2 for x64-based Systems | 5040431 (Security Update) | Important | Elevation of Privilege | 5039213 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3079 |
Yes | 5040431 |
Windows 11 Version 22H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 22H2 for x64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for x64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
Windows Server 2016 | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows Server 2016 (Server Core installation) | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows Server 2019 | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows Server 2019 (Server Core installation) | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows Server 2022 | 5040437 (Security Update) | Important | Elevation of Privilege | 5039227 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2582 |
Yes | 5040437 |
Windows Server 2022 (Server Core installation) | 5040437 (Security Update) | Important | Elevation of Privilege | 5039227 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2582 |
Yes | 5040437 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5040438 (Security Update) | Important | Elevation of Privilege | 5039236 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1009 |
Yes | 5040438 |
CVE ID | Acknowledgements |
CVE-2024-38184 | Philippe Laulheret with Cisco Talos |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38191
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38191 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5040448 (Security Update) | Important | Elevation of Privilege | 5039225 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20710 |
Yes | 5040448 |
Windows 10 for x64-based Systems | 5040448 (Security Update) | Important | Elevation of Privilege | 5039225 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20710 |
Yes | 5040448 |
Windows 10 Version 1607 for 32-bit Systems | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows 10 Version 1607 for x64-based Systems | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows 10 Version 1809 for 32-bit Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 1809 for ARM64-based Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 1809 for x64-based Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 21H2 for 32-bit Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 21H2 for ARM64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 21H2 for x64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for 32-bit Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for ARM64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for x64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 11 version 21H2 for ARM64-based Systems | 5040431 (Security Update) | Important | Elevation of Privilege | 5039213 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3079 |
Yes | 5040431 |
Windows 11 version 21H2 for x64-based Systems | 5040431 (Security Update) | Important | Elevation of Privilege | 5039213 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3079 |
Yes | 5040431 |
Windows 11 Version 22H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 22H2 for x64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for x64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5040499 (Monthly Rollup) 5040490 (Security Only) |
Important | Elevation of Privilege | 5039245 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22769 |
Yes | 5040499 5040490 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5040499 (Monthly Rollup) 5040490 (Security Only) |
Important | Elevation of Privilege | 5039245 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22769 |
Yes | 5040499 5040490 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5040499 (Monthly Rollup) 5040490 (Security Only) |
Important | Elevation of Privilege | 5039245 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22769 |
Yes | 5040499 5040490 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5040499 (Monthly Rollup) 5040490 (Security Only) |
Important | Elevation of Privilege | 5039245 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22769 |
Yes | 5040499 5040490 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5040497 (Monthly Rollup) 5040498 (Security Only) |
Important | Elevation of Privilege | 5039289 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27219 |
Yes | 5040497 5040498 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5040497 (Monthly Rollup) 5040498 (Security Only) |
Important | Elevation of Privilege | 5039289 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27219 |
Yes | 5040497 5040498 |
Windows Server 2012 | 5040485 (Monthly Rollup) | Important | Elevation of Privilege | 5039260 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24975 |
Yes | 5040485 |
Windows Server 2012 (Server Core installation) | 5040485 (Monthly Rollup) | Important | Elevation of Privilege | 5039260 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.24975 |
Yes | 5040485 |
Windows Server 2012 R2 | 5040456 (Monthly Rollup) | Important | Elevation of Privilege | 5039294 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22074 |
Yes | 5040456 |
Windows Server 2012 R2 (Server Core installation) | 5040456 (Monthly Rollup) | Important | Elevation of Privilege | 5039294 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22074 |
Yes | 5040456 |
Windows Server 2016 | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows Server 2016 (Server Core installation) | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows Server 2019 | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows Server 2019 (Server Core installation) | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows Server 2022 | 5040437 (Security Update) | Important | Elevation of Privilege | 5039227 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2582 |
Yes | 5040437 |
Windows Server 2022 (Server Core installation) | 5040437 (Security Update) | Important | Elevation of Privilege | 5039227 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2582 |
Yes | 5040437 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5040438 (Security Update) | Important | Elevation of Privilege | 5039236 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1009 |
Yes | 5040438 |
CVE ID | Acknowledgements |
CVE-2024-38191 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38193
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2024-38193 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: N/A Temporal: N/A Vector: N/A |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: N/A Temporal: N/A Vector: N/A |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: N/A Temporal: N/A Vector: N/A |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: N/A Temporal: N/A Vector: N/A |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: N/A Temporal: N/A Vector: N/A |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: N/A Temporal: N/A Vector: N/A |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38193 | Luigino Camastra and Milánek with Gen Digital |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38196
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38196 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38196 | luckyu with MatrixCup Anonymous with SSD Secure Disclosure |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38197
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Teams for iOS Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) and integrity (I:L) but does not impact availability (A:N)? What does that mean for this vulnerability? The attacker is only able to modify the sender's name of Teams message (I:L) and through social engineering, attempt to trick the recipient into disclosing information (C:L). The availability of the product cannot be affected (A:N). How do I get the update for Microsoft Teams for iOS?
Alternatively
How do I get the update for Teams for Android?
Is there a direct link on the web? Yes: https://play.google.com/store/apps/details?id=com.microsoft.teams Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38197 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Teams for iOS | Release Notes (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C |
7.13.0 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38197 | Andrey Charikov with Check Point Software Technologies Oded Vanunu with Check Point Software Technologies |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38198
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Print Spooler Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38198 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38198 | nsfocus tianji lab with Matrix Cup |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38199
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An unauthenticated attacker could send a specially crafted print task to a shared vulnerable Windows Line Printer Daemon (LPD) service across a network. Successful exploitation could result in remote code execution on the server. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: The following mitigating factors might be helpful in your situation:
Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38199 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Remote Code Execution | 5040438 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38199 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38201
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Stack Hub Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H) and user interaction is required (UI:R). What does that mean for this vulnerability? An attacker would need to trick the user to transfer a malicious JSON file and hope that user does not open and review it. If the user opens it, the user will see an invalid URL and not import it for his dashboard. But in a scenario where the user does import the malicious JSON file, the portal will not immediately send a token. Only in a corner case that a user configures the dashboard again from the portal will there be a token leak. How could an attacker exploit this vulnerability? An elevation of privilege vulnerability exists when the data widget of the Azure Stack Hub dashboard feature does not properly sanitize the connection URL. An unauthenticated attacker could exploit this vulnerability by sending crafted malicious URL to the user. This can be used to exfiltrate the authentication token of a user by sharing a dashboard publicly and then sending the link of the dashboard to the user. If that user clicks on the data widget, the token will leak and can be used by the attacker. The security update addresses vulnerability by helping to ensure that Azure Stack Hub dashboard properly sanitizes connection URLs. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38201 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Stack Hub | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.2311.1.22 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38201 | Felix Boulet with Centre gouvernemental de cyberdéfense (CGCD) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||
CVE-2024-6990
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-6990 Uninitialized Use in Dawn
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    01-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-6990 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
127.0.2651.86 | No | None |
CVE ID | Acknowledgements |
CVE-2024-6990 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||
CVE-2024-7256
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-7256 Insufficient data validation in Dawn
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    01-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-7256 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
127.0.2651.86 | No | None |
CVE ID | Acknowledgements |
CVE-2024-7256 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||
CVE-2024-7255
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-7255 Out of bounds read in WebTransport
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
What is the version information for this release?
Mitigations: None Workarounds: None Revision: 1.0    01-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-7255 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
127.0.2651.86 | No | None |
CVE ID | Acknowledgements |
CVE-2024-7255 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38213
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Mark of the Web Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.0
Executive Summary: None FAQ: What kind of security feature could be bypassed by successfully exploiting this vulnerability? An attacker who successfully exploited this vulnerability could bypass the SmartScreen user experience. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? An attacker must send the user a malicious file and convince them to open it. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. This CVE was addressed by updates that were released in June 2024, but the CVE was inadvertently omitted from the June 2024 Security Updates. This is an informational change only. Customers who have already installed the June 2024 updates do not need to take any further action. |
Moderate | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2024-38213 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5039225 (Security Update) | Moderate | Security Feature Bypass | 5037788 | Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.10240.20680 | Yes | None |
Windows 10 for x64-based Systems | 5039225 (Security Update) | Moderate | Security Feature Bypass | 5037788 | Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.10240.20680 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5039214 (Security Update) | Moderate | Security Feature Bypass | 5037763 | Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.14393.7070 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5039214 (Security Update) | Moderate | Security Feature Bypass | 5037763 | Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.14393.7070 | Yes | None |
Windows 10 Version 1809 for 32-bit Systems | 5039217 (Security Update) | Moderate | Security Feature Bypass | 5037765 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.17763.5936 |
Yes | 5039217 |
Windows 10 Version 1809 for ARM64-based Systems | 5039217 (Security Update) | Moderate | Security Feature Bypass | 5037765 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.17763.5936 |
Yes | 5039217 |
Windows 10 Version 1809 for x64-based Systems | 5039217 (Security Update) | Moderate | Security Feature Bypass | 5037765 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.17763.5936 |
Yes | 5039217 |
Windows 10 Version 21H2 for 32-bit Systems | 5039211 (Security Update) | Moderate | Security Feature Bypass | 5037768 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.19044.4529 |
Yes | 5039211 |
Windows 10 Version 21H2 for ARM64-based Systems | 5039211 (Security Update) | Moderate | Security Feature Bypass | 5037768 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.19044.4529 |
Yes | 5039211 |
Windows 10 Version 21H2 for x64-based Systems | 5039211 (Security Update) | Moderate | Security Feature Bypass | 5037768 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.19044.4529 |
Yes | 5039211 |
Windows 10 Version 22H2 for 32-bit Systems | 5039211 (Security Update) | Moderate | Security Feature Bypass | 5037768 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.19045.4529 |
Yes | 5039211 |
Windows 10 Version 22H2 for ARM64-based Systems | 5039211 (Security Update) | Moderate | Security Feature Bypass | 5037768 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.19045.4529 |
Yes | 5039211 |
Windows 10 Version 22H2 for x64-based Systems | 5039211 (Security Update) | Moderate | Security Feature Bypass | 5037768 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.19045.4529 |
Yes | 5039211 |
Windows 11 version 21H2 for ARM64-based Systems | 5039213 (Security Update) | Moderate | Security Feature Bypass | 5037770 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.22000.3019 |
Yes | 5039213 |
Windows 11 version 21H2 for x64-based Systems | 5039213 (Security Update) | Moderate | Security Feature Bypass | 5037770 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.22000.3019 |
Yes | 5039213 |
Windows 11 Version 22H2 for ARM64-based Systems | 5039212 (Security Update) | Moderate | Security Feature Bypass | 5037771 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.22621.3737 |
Yes | 5039212 |
Windows 11 Version 22H2 for x64-based Systems | 5039212 (Security Update) | Moderate | Security Feature Bypass | 5037771 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.22621.3737 |
Yes | 5039212 |
Windows 11 Version 23H2 for ARM64-based Systems | 5039212 (Security Update) | Moderate | Security Feature Bypass | 5037771 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.22631.3737 |
Yes | 5039212 |
Windows 11 Version 23H2 for x64-based Systems | 5039212 (Security Update) | Moderate | Security Feature Bypass | 5037771 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.22631.3737 |
Yes | 5039212 |
Windows Server 2012 | 5039260 (Monthly Rollup) | Moderate | Security Feature Bypass | 5037778 | Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
6.2.9200.24919 | Yes | None |
Windows Server 2012 (Server Core installation) | 5039260 (Monthly Rollup) | Moderate | Security Feature Bypass | 5037778 | Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
6.2.9200.24919 | Yes | None |
Windows Server 2012 R2 | 5039294 (Monthly Rollup) | Moderate | Security Feature Bypass | 5037823 | Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
6.3.9600.22023 | Yes | None |
Windows Server 2012 R2 (Server Core installation) | 5039294 (Monthly Rollup) | Moderate | Security Feature Bypass | 5037823 | Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
6.3.9600.22023 | Yes | None |
Windows Server 2016 | 5039214 (Security Update) | Moderate | Security Feature Bypass | 5037763 | Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.14393.7070 | Yes | None |
Windows Server 2016 (Server Core installation) | 5039214 (Security Update) | Moderate | Security Feature Bypass | 5037763 | Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.14393.7070 | Yes | None |
Windows Server 2019 | 5039217 (Security Update) | Moderate | Security Feature Bypass | 5037765 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.17763.5936 |
Yes | 5039217 |
Windows Server 2019 (Server Core installation) | 5039217 (Security Update) | Moderate | Security Feature Bypass | 5037765 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.17763.5936 |
Yes | 5039217 |
Windows Server 2022 | 5039227 (Security Update) 5039330 (Security Hotpatch Update) |
Moderate | Security Feature Bypass | 5037782 5037848 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.20348.2527 10.0.20348.2522 |
Yes | 5039227 |
Windows Server 2022 (Server Core installation) | 5039227 (Security Update) 5039330 (Security Hotpatch Update) |
Moderate | Security Feature Bypass | 5037782 5037848 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.20348.2527 10.0.20348.2522 |
Yes | 5039227 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5039236 (Security Update) | Moderate | Security Feature Bypass | 5037781 |
Base: 6.5 Temporal: 6.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C |
10.0.25398.950 |
Yes | 5039236 |
CVE ID | Acknowledgements |
CVE-2024-38213 | Peter Girnus (@gothburz) of Trend Micro with Trend Micro |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||
CVE-2024-7536
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-7550 Type Confusion in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-7536 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
127.0.2651.98 | No | None |
CVE ID | Acknowledgements |
CVE-2024-7536 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||
CVE-2024-7535
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-7536 Use after free in WebAudio
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-7535 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
127.0.2651.98 | No | None |
CVE ID | Acknowledgements |
CVE-2024-7535 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||
CVE-2024-7550
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-7532 Out of bounds memory access in ANGLE
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-7550 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
127.0.2651.98 | No | None |
CVE ID | Acknowledgements |
CVE-2024-7550 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||
CVE-2024-7532
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-7533 Use after free in Sharing
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-7532 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
127.0.2651.98 | No | None |
CVE ID | Acknowledgements |
CVE-2024-7532 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||
CVE-2024-7534
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-7535 Inappropriate implementation in V8
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-7534 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
127.0.2651.98 | No | None |
CVE ID | Acknowledgements |
CVE-2024-7534 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||
CVE-2024-7533
MITRE NVD Issuing CNA: Chrome |
CVE Title: Chromium: CVE-2024-7534 Heap buffer overflow in Layout
CVSS: None Executive Summary: This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information. FAQ: What is the version information for this release?
Why is this Chrome CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable. How can I see the version of the browser?
Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-7533 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
127.0.2651.98 | No | None |
CVE ID | Acknowledgements |
CVE-2024-7533 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-21302
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:6.1
Executive Summary: Summary:Microsoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS), including a subset of Azure Virtual Machine SKUS. This vulnerability enables an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS. Microsoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE. This CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs. Update: August 13, 2024 Microsoft has released the August 2024 security updates that include an opt-in revocation policy mitigation to address this vulnerability. Customers running affected versions of Windows are strongly encouraged to implement this opt-in mitigation, which is summarized in KB5042562: Guidance for blocking rollback of virtualization-based security related updates. Caution: There are risks associated with this mitigation that should be understood prior to applying it to your systems. Detailed information about these risks is also available in KB5042562. Details:A security researcher informed Microsoft of an elevation of privilege vulnerability in Windows 10, Windows 11, Windows Server 2016, and higher based systems including Azure Virtual Machines (VM) that support VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn. The vulnerability enables an attacker with administrator privileges on the target system to replace current Windows system files with outdated versions. Successful exploitation provides an attacker with the ability to reintroduce previously mitigated vulnerabilities, circumvent VBS security features, and exfiltrate data protected by VBS. Microsoft is developing a security update that will revoke outdated, unpatched VBS system files to mitigate this vulnerability, but it is not yet available. Due to the complexity of blocking such a large quantity of files, rigorous testing is required to avoid integration failures or regressions. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. For more information see Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now – Microsoft Security Response Center Microsoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 7, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section to protect their systems. Recommended Actions:Microsoft has released an opt-in mitigation available as an interim solution to help protect customers concerned about this vulnerability until the final mitigation is available in a security update.
Caution: There are risks associated with this mitigation that should be understood prior to applying it to your systems. Detailed information about these risks is also available in KB5042562.The following recommendations do not mitigate the vulnerability but can be used to reduce the risk of exploitation until the security update is available.
Detections:A detection has been added to Microsoft Defender for Endpoint (MDE) to alert customers using this product of an exploit attempt. Instructions for how Azure customers can integrate and enable MDE with Defender for Cloud are found here:
Note: False positives may be triggered by legitimate operations due to detection logic. Customers should investigate any alert for this detection to validate the root cause. FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    07-Aug-24     Information published. 1.1    08-Aug-24     Added the Details, Recommended Actions, and Detections sections in the CVE Executive Summary because these were omitted when the CVE was initially published. 2.0    13-Aug-24     Microsoft has released the August 2024 security updates that include an opt-in mitigation available as an interim solution to help protect customers concerned about this vulnerability until the final mitigation is available in a security update. For more information, please see KB5042562: Guidance for blocking rollback of virtualization-based security related updates. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-21302 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5040448 (Security Update) | Important | Elevation of Privilege | 5039225 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.10240.20710 |
Yes | 5040448 |
Windows 10 for x64-based Systems | 5040448 (Security Update) | Important | Elevation of Privilege | 5039225 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.10240.20710 |
Yes | 5040448 |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 6.7 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-21302 | Alon Leviev with SafeBreach |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-40547
MITRE NVD Issuing CNA: Red Hat, Inc. |
CVE Title: Redhat: CVE-2023-40547 Shim - RCE in HTTP boot support may lead to secure boot bypass
CVSS: CVSS:3.1 Highest BaseScore:8.3/TemporalScore:8.3
Executive Summary: None FAQ: Why is this Red Hat, Inc. CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Linux Shim boot. It is being documented in the Security Update Guide to announce that the latest builds of Microsoft Windows address this vulnerability by blocking old, unpatched, Linux boot loaders by applying SBAT (Secure Boot Advanced Targeting) EFI variables in the UEFI library. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. For more information see: CVE-2023-40547. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Will this update affect my ability to boot Linux after applying this update? To address this security issue, Windows will apply a Secure Boot Advanced Targeting (SBAT) update to block vulnerable Linux boot loaders that could have an impact on Windows security. The SBAT value is not applied to dual-boot systems that boot both Windows and Linux and should not affect these systems. You might find that older Linux distribution ISOs will not boot. If this occurs, work with your Linux vendor to get an update. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Critical | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2023-40547 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Critical | Security Feature Bypass | 5040448 | Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Critical | Security Feature Bypass | 5040448 | Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Critical | Security Feature Bypass | 5040434 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Critical | Security Feature Bypass | 5040434 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Critical | Security Feature Bypass | 5040430 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Critical | Security Feature Bypass | 5040430 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Critical | Security Feature Bypass | 5040430 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Critical | Security Feature Bypass | 5040427 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Critical | Security Feature Bypass | 5040427 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Critical | Security Feature Bypass | 5040427 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Critical | Security Feature Bypass | 5040427 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Critical | Security Feature Bypass | 5040427 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Critical | Security Feature Bypass | 5040427 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Critical | Security Feature Bypass | 5040431 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Critical | Security Feature Bypass | 5040431 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Critical | Security Feature Bypass | 5040442 | Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Critical | Security Feature Bypass | 5040442 | Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Critical | Security Feature Bypass | 5040442 | Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Critical | Security Feature Bypass | 5040442 | Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Critical | Security Feature Bypass | 5040435 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Critical | Security Feature Bypass | 5040435 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2012 | 5041851 (Monthly Rollup) | Critical | Security Feature Bypass | 5040485 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Critical | Security Feature Bypass | 5040485 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Critical | Security Feature Bypass | 5040456 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Critical | Security Feature Bypass | 5040456 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Critical | Security Feature Bypass | 5040434 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Critical | Security Feature Bypass | 5040434 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Critical | Security Feature Bypass | 5040430 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Critical | Security Feature Bypass | 5040430 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Critical | Security Feature Bypass | 5040437 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Critical | Security Feature Bypass | 5040437 |
Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Critical | Security Feature Bypass | 5040438 | Base: 8.3 Temporal: 8.3 Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2023-40547 | Bill Demirkapi with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38084
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft OfficePlus Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38084 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft OfficePLUS | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
3.2.0.27546 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38084 | Crispr Xiang(@Crispr) with FDU |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38063
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows TCP/IP Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An unauthenticated attacker could repeatedly send IPv6 packets, that include specially crafted packets, to a Windows machine which could enable remote code execution. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:
Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38063 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Critical | Remote Code Execution | 5040448 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Critical | Remote Code Execution | 5040448 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Critical | Remote Code Execution | 5040431 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Critical | Remote Code Execution | 5040431 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Critical | Remote Code Execution | 5040442 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Critical | Remote Code Execution | 5040442 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Critical | Remote Code Execution | 5040442 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Critical | Remote Code Execution | 5040442 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Critical | Remote Code Execution | 5040435 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Critical | Remote Code Execution | 5040435 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Critical | Remote Code Execution | 5040499 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Critical | Remote Code Execution | 5040499 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Critical | Remote Code Execution | 5040499 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Critical | Remote Code Execution | 5040499 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Critical | Remote Code Execution | 5040497 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Critical | Remote Code Execution | 5040497 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Critical | Remote Code Execution | 5040485 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Critical | Remote Code Execution | 5040485 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Critical | Remote Code Execution | 5040456 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Critical | Remote Code Execution | 5040456 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Critical | Remote Code Execution | 5040437 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Critical | Remote Code Execution | 5040437 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Critical | Remote Code Execution | 5040438 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38063 | Wei in Kunlun Lab with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38098
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Unlikely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38098 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Connected Machine Agent | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.44 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38098 | Filip Dragović BochengXiang(@Crispr) with FDU @sim0nsecurity |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38106
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.5
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2024-38106 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.0 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38106 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38107
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2024-38107 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 7.2 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38107 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-29995
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kerberos Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-29995 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 8.1 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
CVE ID | Acknowledgements |
CVE-2024-29995 | Eyal Ronen (Tel Aviv University) with Michal Shagam (Tel Aviv University) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38114
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38114 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Remote Code Execution | 5040438 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38114 | QingHe Xie FangMing Gu Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38115
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38115 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Remote Code Execution | 5040438 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38115 | Anonymous QingHe Xie FangMing Gu |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38116
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38116 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Remote Code Execution | 5040438 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38116 | QingHe Xie FangMing Gu Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38117
MITRE NVD Issuing CNA: Microsoft |
CVE Title: NTFS Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, privileges required is Low (PR:L). What does that mean for this vulnerability? To exploit this vulnerability an attacker must have an account with the User role assigned. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38117 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38117 | hazard |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38118
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of stack memory. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38118 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Information Disclosure | 5040448 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Information Disclosure | 5040448 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Information Disclosure | 5040431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Information Disclosure | 5040431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Information Disclosure | 5040435 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Information Disclosure | 5040435 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Information Disclosure | 5040497 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Information Disclosure | 5040497 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Information Disclosure | 5040485 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Information Disclosure | 5040485 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Information Disclosure | 5040456 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Information Disclosure | 5040456 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Information Disclosure | 5040437 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Information Disclosure | 5040437 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Information Disclosure | 5040438 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38118 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38121
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38121 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Remote Code Execution | 5040438 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38121 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38122
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could potentially read small portions of stack memory. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38122 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Information Disclosure | 5040448 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Information Disclosure | 5040448 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Information Disclosure | 5040431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Information Disclosure | 5040431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Information Disclosure | 5040435 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Information Disclosure | 5040435 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Information Disclosure | 5040497 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Information Disclosure | 5040497 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Information Disclosure | 5040485 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Information Disclosure | 5040485 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Information Disclosure | 5040456 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Information Disclosure | 5040456 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Information Disclosure | 5040437 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Information Disclosure | 5040437 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Information Disclosure | 5040438 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38122 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38125
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38125 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38125 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38126
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38126 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Denial of Service | 5040448 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Denial of Service | 5040448 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Denial of Service | 5040431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Denial of Service | 5040431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Denial of Service | 5040435 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Denial of Service | 5040435 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Denial of Service | 5040456 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Denial of Service | 5040456 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Denial of Service | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Denial of Service | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Denial of Service | 5040438 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38126 | Wei in Kunlun Lab with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38127
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38127 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38127 | Thunder_J |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38128
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38128 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Remote Code Execution | 5040438 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38128 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38130
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38130 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Remote Code Execution | 5040438 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38130 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38131
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Clipboard Virtual Channel Extension Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38131 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Remote Desktop client for Windows Desktop | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.2.5560.0 | Maybe | None |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Remote Code Execution | 5040438 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38131 | YingQi Shi (@Mas0n) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38132
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38132 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Denial of Service | 5040448 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Denial of Service | 5040448 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Denial of Service | 5040431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Denial of Service | 5040431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Denial of Service | 5040435 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Denial of Service | 5040435 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Denial of Service | 5040456 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Denial of Service | 5040456 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Denial of Service | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Denial of Service | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Denial of Service | 5040438 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38132 | Wei in Kunlun Lab with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38133
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38133 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38133 | Thijs Alkemade with Computest Sector 7 Khaled Nassar with Computest Sector 7 Daan Keuper with Computest Sector 7 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38134
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38134 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38134 | Angelboy (@scwuaptx) with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38135
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38135 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38135 | Dan Reynolds and Sam Pope with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38136
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38136 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38136 | luckyu with NorthSea |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38137
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to win a race condition. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38137 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38137 | luckyu with NorthSea |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38138
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Deployment Services Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? For an attacker to exploit this vulnerability, they would need to have knowledge of a specific operation that triggers a memory allocation failure, specifically a use after free. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires the attacker to be an authenticated Windows Deployment Services user and to request a certain operation via an RPC call. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38138 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2016 | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Remote Code Execution | 5040438 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38138 | VictorV(Tang tianwen) with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38140
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An unauthenticated attacker could exploit the vulnerability by sending specially crafted packets to a Windows Pragmatic General Multicast (PGM) open socket on the server, without any interaction from the user. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: The following mitigating factors might be helpful in your situation: This vulnerability is only exploitable only if there is a program listening on a Pragmatic General Multicast (PGM) port. If PGM is installed or enabled but no programs are actively listening as a receiver, then this vulnerability is not exploitable. PGM does not authenticate requests so it is recommended to protect access to any open ports at the network level (e.g. with a firewall). It is not recommended to expose a PGM receiver to the public internet. Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38140 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Critical | Remote Code Execution | 5040448 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Critical | Remote Code Execution | 5040448 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Critical | Remote Code Execution | 5040431 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Critical | Remote Code Execution | 5040431 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Critical | Remote Code Execution | 5040442 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Critical | Remote Code Execution | 5040442 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Critical | Remote Code Execution | 5040442 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Critical | Remote Code Execution | 5040442 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Critical | Remote Code Execution | 5040435 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Critical | Remote Code Execution | 5040435 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Critical | Remote Code Execution | 5040499 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Critical | Remote Code Execution | 5040499 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Critical | Remote Code Execution | 5040499 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Critical | Remote Code Execution | 5040499 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Critical | Remote Code Execution | 5040497 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Critical | Remote Code Execution | 5040497 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Critical | Remote Code Execution | 5040485 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Critical | Remote Code Execution | 5040485 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Critical | Remote Code Execution | 5040456 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Critical | Remote Code Execution | 5040456 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Critical | Remote Code Execution | 5040437 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Critical | Remote Code Execution | 5040437 |
Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Critical | Remote Code Execution | 5040438 | Base: 9.8 Temporal: 8.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38140 | Kyle Westhaus with Microsoft Offensive Research & Security Engineering (MORSE) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38141
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38141 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38141 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38142
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38142 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38142 | Microsoft Offensive Research & Security Engineering (MORSE) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38143
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:4.2/TemporalScore:3.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An unauthenticated attacker could exploit the vulnerability by interacting with a malicious wireless network from the lock screen of a device. Successful exploitation of this vulnerability does not crash systems or allow unauthorized access. However, it can potentially leak sensitive information. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38143 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 4.2 Temporal: 3.7 Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38143 | John Jackson |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38144
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38144 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38144 | Angelboy (@scwuaptx) with DEVCORE Anonymous with SSD Secure Disclosure anonymous with MatrixCup |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38145
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38145 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Denial of Service | 5040448 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Denial of Service | 5040448 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Denial of Service | 5040431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Denial of Service | 5040431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Denial of Service | 5040435 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Denial of Service | 5040435 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Denial of Service | 5040485 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Denial of Service | 5040485 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Denial of Service | 5040456 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Denial of Service | 5040456 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Denial of Service | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Denial of Service | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Denial of Service | 5040438 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38145 | Wei in Kunlun Lab with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38146
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38146 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Denial of Service | 5040448 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Denial of Service | 5040448 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Denial of Service | 5040427 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Denial of Service | 5040431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Denial of Service | 5040431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Denial of Service | 5040435 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Denial of Service | 5040435 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Denial of Service | 5040485 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Denial of Service | 5040485 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Denial of Service | 5040456 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Denial of Service | 5040456 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Denial of Service | 5040434 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Denial of Service | 5040430 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Denial of Service | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Denial of Service | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Denial of Service | 5040438 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38146 | Wei in Kunlun Lab with Cyber KunLun |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38147
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38147 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38147 | Zhang WangJunJie, He YiSheng with Hillstone Network Security Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38148
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Secure Channel Denial of Service Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Executive Summary: None FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Denial of Service |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38148 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Denial of Service | 5040431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Denial of Service | 5040431 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Denial of Service | 5040442 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Denial of Service | 5040435 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Denial of Service | 5040435 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2022 | 5041160 (Security Update) | Important | Denial of Service | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Denial of Service | 5040437 |
Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Denial of Service | 5040438 | Base: 7.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38148 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38150
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38150 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38150 | Zhang WangJunJie, He YiSheng with Hillstone Network Security Research Institute |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38151
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is a small amount of kernel memory which could be leaked back to the attacker. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38151 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Information Disclosure | 5040448 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Information Disclosure | 5040448 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Information Disclosure | 5040431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Information Disclosure | 5040431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Information Disclosure | 5040435 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Information Disclosure | 5040435 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Information Disclosure | 5040497 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Information Disclosure | 5040497 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Information Disclosure | 5040485 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Information Disclosure | 5040485 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Information Disclosure | 5040456 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Information Disclosure | 5040456 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Information Disclosure | 5040437 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Information Disclosure | 5040437 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Information Disclosure | 5040438 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38151 | Naceri with MSRC Vulnerabilities & Mitigations |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38152
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows OLE Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38152 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Remote Code Execution | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Remote Code Execution | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Remote Code Execution | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Remote Code Execution | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Remote Code Execution | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Remote Code Execution | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38152 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38153
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38153 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Elevation of Privilege | 5040499 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Elevation of Privilege | 5040497 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Elevation of Privilege | 5040485 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38153 | Microsoft Offensive Research & Security Engineering (MORSE) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38154
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38154 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Remote Code Execution | 5040438 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38154 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38155
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Security Center Broker Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Executive Summary: None FAQ: What type of information could be disclosed by this vulnerability? An attacker who successfully exploited this vulnerability could view heap memory from a privileged process running on the server. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38155 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Information Disclosure | 5040427 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Information Disclosure | 5040431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Information Disclosure | 5040431 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Information Disclosure | 5040442 | Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Information Disclosure | 5040435 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Information Disclosure | 5040435 |
Base: 5.5 Temporal: 4.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
CVE ID | Acknowledgements |
CVE-2024-38155 | nevul37 with CW Research Inc. |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38157
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure IoT SDK Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? The attacker must have permissions to access the target domain environment to be able to exploit this vulnerability. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38157 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure IoT Hub Device Client SDK | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.12.1 | No | None |
CVE ID | Acknowledgements |
CVE-2024-38157 | VictorV(Tang tianwen) with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38158
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure IoT SDK Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? The attacker must have permissions to access the target domain environment to be able to exploit this vulnerability. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38158 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
C SDK for Azure IoT | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.0 Temporal: 6.1 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.12.1 | No | None |
CVE ID | Acknowledgements |
CVE-2024-38158 | VictorV(Tang tianwen) with Kunlun Lab |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38162
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited the vulnerability? An attacker who successfully exploited this vulnerability could create or delete files in the security context of the NT AUTHORITY\ SYSTEM account. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38162 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Connected Machine Agent | Release Notes (Security Update) | Important | Elevation of Privilege | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.44 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38162 | Filip Dragović |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38165
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Compressed Folder Tampering Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires that a user open a specially crafted file.
An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action. |
Important | Tampering |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38165 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 11 Version 22H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Tampering | 5039212 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 22H2 for x64-based Systems | 5040442 (Security Update) | Important | Tampering | 5039212 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Tampering | 5039212 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for x64-based Systems | 5040442 (Security Update) | Important | Tampering | 5039212 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
CVE ID | Acknowledgements |
CVE-2024-38165 | Terrynini with DEVCORE |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38169
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38169 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
CVE ID | Acknowledgements |
CVE-2024-38169 | Anonymous with Trend Micro Zero day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38170
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38170 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.1 Temporal: 6.2 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C |
16.88.24081116 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38170 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38171
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft PowerPoint Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38171 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC for Mac 2021 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.88.24081116 | Maybe | None |
Microsoft PowerPoint 2016 (32-bit edition) | 5002586 (Security Update) | Important | Remote Code Execution | 5002495 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5461.1000 | Maybe | None |
Microsoft PowerPoint 2016 (64-bit edition) | 5002586 (Security Update) | Important | Remote Code Execution | 5002495 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5461.1000 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38171 | Anonymous working with Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38173
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Outlook Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. According to the CVSS metric, the attack complexity is high (AC:H) and privileges required are low (PR:L). What does that mean for this vulnerability? An attacker must gain access to the victim user's Microsoft Outlook account by compromising or stealing their login credential and then install a malicious form prior to exploiting the vulnerability successfully. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Successful exploitation of this vulnerability requires a user to open a malicious email with an affected version of Microsoft Outlook and then perform specific actions to trigger the vulnerability. Is the Preview Pane an attack vector for this vulnerability? Yes, the Preview Pane is an attack vector. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38173 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Outlook 2016 (32-bit edition) | 5002626 (Security Update) | Important | Remote Code Execution | 5002621 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5461.1001 | Maybe | None |
Microsoft Outlook 2016 (64-bit edition) | 5002626 (Security Update) | Important | Remote Code Execution | 5002621 | Base: 6.7 Temporal: 5.8 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
16.0.5461.1001 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38173 | Michael Gorelik with Morphisec Michael Gorelik with Morphisec Shmuel Uzan with Morphisec |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38177
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows App Installer Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The attacker must convince a user to call Windows App Installer with a specially crafted malicious winget file. How can I find more information regarding Windows App Installer and Winget? Please read this page to understand more about App Installer: [Installing the App Installer(https://learn.microsoft.com/en-us/windows/msix/app-installer/install-update-app-installer). Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38177 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
App Installer | Release Notes (Security Update) | Important | Spoofing | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
1.22.11261.0 | No | None |
CVE ID | Acknowledgements |
CVE-2024-38177 | Felix Boulet |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38180
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows SmartScreen Security Feature Bypass Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? A user needs to be tricked into running malicious files. How could an attacker exploit this vulnerability? To exploit this security feature bypass vulnerability, an attacker would need to convince a user to launch malicious files using a launcher application that requests that no UI be shown. Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Security Feature Bypass |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38180 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Security Feature Bypass | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Security Feature Bypass | 5040448 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Security Feature Bypass | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Security Feature Bypass | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Security Feature Bypass | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Security Feature Bypass | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Security Feature Bypass | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Security Feature Bypass | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Security Feature Bypass | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Security Feature Bypass | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Security Feature Bypass | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Security Feature Bypass | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Security Feature Bypass | 5040427 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Security Feature Bypass | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Security Feature Bypass | 5040431 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Security Feature Bypass | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Security Feature Bypass | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Security Feature Bypass | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Security Feature Bypass | 5040442 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Security Feature Bypass | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Security Feature Bypass | 5040435 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Security Feature Bypass | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Security Feature Bypass | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Security Feature Bypass | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Security Feature Bypass | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Security Feature Bypass | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Security Feature Bypass | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Security Feature Bypass | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Security Feature Bypass | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Security Feature Bypass | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Security Feature Bypass | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Security Feature Bypass | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Security Feature Bypass | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Security Feature Bypass | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Security Feature Bypass | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Security Feature Bypass | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Security Feature Bypass | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Security Feature Bypass | 5040438 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38180 | Harry Withington with Aura Information Security |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38185
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38185 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows 10 Version 1607 for x64-based Systems | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows 10 Version 1809 for 32-bit Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 1809 for ARM64-based Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 1809 for x64-based Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 21H2 for 32-bit Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 21H2 for ARM64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 21H2 for x64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for 32-bit Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for ARM64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for x64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 11 version 21H2 for ARM64-based Systems | 5040431 (Security Update) | Important | Elevation of Privilege | 5039213 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3079 |
Yes | 5040431 |
Windows 11 version 21H2 for x64-based Systems | 5040431 (Security Update) | Important | Elevation of Privilege | 5039213 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3079 |
Yes | 5040431 |
Windows 11 Version 22H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 22H2 for x64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for x64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
Windows Server 2016 | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows Server 2016 (Server Core installation) | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows Server 2019 | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows Server 2019 (Server Core installation) | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows Server 2022 | 5040437 (Security Update) | Important | Elevation of Privilege | 5039227 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2582 |
Yes | 5040437 |
Windows Server 2022 (Server Core installation) | 5040437 (Security Update) | Important | Elevation of Privilege | 5039227 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2582 |
Yes | 5040437 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5040438 (Security Update) | Important | Elevation of Privilege | 5039236 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1009 |
Yes | 5040438 |
CVE ID | Acknowledgements |
CVE-2024-38185 | Philippe Laulheret with Cisco Talos |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38186
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38186 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows 10 Version 1607 for x64-based Systems | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows 10 Version 1809 for 32-bit Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 1809 for ARM64-based Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 1809 for x64-based Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 21H2 for 32-bit Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 21H2 for ARM64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 21H2 for x64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for 32-bit Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for ARM64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for x64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 11 version 21H2 for ARM64-based Systems | 5040431 (Security Update) | Important | Elevation of Privilege | 5039213 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3079 |
Yes | 5040431 |
Windows 11 version 21H2 for x64-based Systems | 5040431 (Security Update) | Important | Elevation of Privilege | 5039213 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3079 |
Yes | 5040431 |
Windows 11 Version 22H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 22H2 for x64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for x64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
Windows Server 2016 | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows Server 2016 (Server Core installation) | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows Server 2019 | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows Server 2019 (Server Core installation) | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows Server 2022 | 5040437 (Security Update) | Important | Elevation of Privilege | 5039227 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2582 |
Yes | 5040437 |
Windows Server 2022 (Server Core installation) | 5040437 (Security Update) | Important | Elevation of Privilege | 5039227 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2582 |
Yes | 5040437 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5040438 (Security Update) | Important | Elevation of Privilege | 5039236 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1009 |
Yes | 5040438 |
CVE ID | Acknowledgements |
CVE-2024-38186 | Philippe Laulheret with Cisco Talos |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38187
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38187 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows 10 Version 1607 for x64-based Systems | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows 10 Version 1809 for 32-bit Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 1809 for ARM64-based Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 1809 for x64-based Systems | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows 10 Version 21H2 for 32-bit Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 21H2 for ARM64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 21H2 for x64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for 32-bit Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for ARM64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 10 Version 22H2 for x64-based Systems | 5040427 (Security Update) | Important | Elevation of Privilege | 5039211 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4651 |
Yes | 5040427 |
Windows 11 version 21H2 for ARM64-based Systems | 5040431 (Security Update) | Important | Elevation of Privilege | 5039213 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3079 |
Yes | 5040431 |
Windows 11 version 21H2 for x64-based Systems | 5040431 (Security Update) | Important | Elevation of Privilege | 5039213 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3079 |
Yes | 5040431 |
Windows 11 Version 22H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 22H2 for x64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for ARM64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
Windows 11 Version 23H2 for x64-based Systems | 5040442 (Security Update) | Important | Elevation of Privilege | 5039212 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.3880 |
Yes | 5040442 |
Windows Server 2016 | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows Server 2016 (Server Core installation) | 5040434 (Security Update) | Important | Elevation of Privilege | 5039214 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7159 |
Yes | 5040434 |
Windows Server 2019 | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows Server 2019 (Server Core installation) | 5040430 (Security Update) | Important | Elevation of Privilege | 5039217 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6054 |
Yes | 5040430 |
Windows Server 2022 | 5040437 (Security Update) | Important | Elevation of Privilege | 5039227 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2582 |
Yes | 5040437 |
Windows Server 2022 (Server Core installation) | 5040437 (Security Update) | Important | Elevation of Privilege | 5039227 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2582 |
Yes | 5040437 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5040438 (Security Update) | Important | Elevation of Privilege | 5039236 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1009 |
Yes | 5040438 |
CVE ID | Acknowledgements |
CVE-2024-38187 | Philippe Laulheret with Cisco Talos |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38189
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Project Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.2
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? Exploitation requires the victim to open a malicious Microsoft Office Project file on a system where the Block macros from running in Office files from the Internet policy is disabled and VBA Macro Notification Settings are not enabled allowing the attacker to perform remote code execution.
An attacker would have no way to force the victim to visit the website. Instead, an attacker would have to convince the victim to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the malicious file. Is the Preview Pane an attack vector for this vulnerability? No, the Preview Pane is not an attack vector. Mitigations: The following mitigating factors might be helpful in your situation: Microsoft strongly recommends customers do not disable the Block macros from running in Office files from the Internet policy which protects against this vulnerability. However, customers who have disabled this policy can alternatively enable VBA Macro Notification Settings to protect their systems from this vulnerability being exploited. Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Detected | No | Yes |
The following tables list the affected software details for the vulnerability.
CVE-2024-38189 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Remote Code Execution | None | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Project 2016 (32-bit edition) | 5002561 (Security Update) | Important | Remote Code Execution | 5002328 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
16.0.5461.1001 | Maybe | None |
Microsoft Project 2016 (64-bit edition) | 5002561 (Security Update) | Important | Remote Code Execution | 5002328 | Base: 8.8 Temporal: 8.2 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C |
16.0.5461.1001 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38189 |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38195
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure CycleCloud Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: How could an attacker exploit this vulnerability? An authenticated attacker with permissions to execute commands on the Azure CycleCloud instance could send a specially crafted request that returns the storage account credentials and runtime data. The attacker can then use the comprised credentials to access the underlying storage resources and upload malicious scripts which will be executed as Root, enabling remote code execution to be performed on any cluster in the CycleCloud instance. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38195 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure CycleCloud 8.0.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.0.1 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.0.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.1.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.1.1 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.2.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.2.1 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.2.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.3.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.4.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.4.1 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.4.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.5.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.6.0 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.6.1 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
Azure CycleCloud 8.6.2 | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
8.6.3 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38195 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38163
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Update Stack Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: How do I protect myself from this vulnerability? The vulnerability pertains to a previous installer version which has been superseded by the new WinRE installer. Since the vulnerability is only exploitable at the install time, users need to take no action to be protected from this vulnerability. See the linked Article in the Security Updates table about the update for your particular Windows version. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. How do I know if I need to install the update to be protected from this vulnerability? You do not need to install the standalone updates listed in the Security Updates table if either of the following applies:
Note that the update will not be offered if your machine does not have enough free space on your WinRE Recovery Partition, or if you do not have WinRE enabled. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation More Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38163 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 21H2 for 32-bit Systems | 5042320 (Security Update) | Important | Elevation of Privilege | 5034441 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Not applicable | Maybe | None |
Windows 10 Version 21H2 for x64-based Systems | 5042320 (Security Update) | Important | Elevation of Privilege | 5034441 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Not applicable | Maybe | None |
Windows 10 Version 22H2 for 32-bit Systems | 5042320 (Security Update) | Important | Elevation of Privilege | 5034441 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Not applicable | Maybe | None |
Windows 10 Version 22H2 for x64-based Systems | 5042320 (Security Update) | Important | Elevation of Privilege | 5034441 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Not applicable | Maybe | None |
Windows 11 version 21H2 for x64-based Systems | 5042321 (Security Update) | Important | Elevation of Privilege | 5034440 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Not Applicable | Maybe | None |
Windows Server 2022 | 5042322 (Security Update) | Important | Elevation of Privilege | 5034439 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
Not applicable | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38163 | Ilan Kotler Sandro Poppi Nicholas Zubrisky (@NZubrisky) of Trend Micro Zero Day Initiative |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38200
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Office Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. Am I vulnerable to this issue until I install the August 13, 2024 updates? No, we identified an alternative fix to this issue that we enabled via Feature Flighting on 7/30/2024. Customers are already protected on all in-support versions of Microsoft Office and Microsoft 365. Customers should still update to the August 13, 2024 updates for the final version of the fix. When will a final update be available to address this vulnerability? The Security Updates table will be revised when the update is publicly available. If you wish to be notified when these update is released, we recommend that you register for the security notifications mailer to be alerted of content changes to this CVE. See Microsoft Technical Security Notifications and Coming Soon: New Security Update Guide Notification System. There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software? Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order. Mitigations: The following mitigating factors may be helpful in your situation: Configuring the Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers policy setting provides the ability to allow, block, or audit outgoing NTLM traffic from a computer running Windows Server 2008, Windows Server 2008 R2, or later to any remote server running the Windows operating system. Performing this mitigation allows you to block or audit all attempts to connect to remote servers through NTLM authentication. Please note: Modifying this policy setting may affect compatibility with client computers, services, and applications. The following mitigating factors may be helpful in your situation:
Workarounds: None Revision: 1.0    08-Aug-24     Information published. 1.1    09-Aug-24     Added FAQ information. This is an informational change only. 1.2    10-Aug-24     Updated the Publicly Disclosed information. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38200 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Click to Run (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Click to Run (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2016 (32-bit edition) | 5002625 (Security Update) 5002570 (Security Update) |
Important | Spoofing | 5002620 5002519 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.5461.1001 16.0.5461.1000 |
Maybe | None |
Microsoft Office 2016 (64-bit edition) | 5002625 (Security Update) 5002570 (Security Update) |
Important | Spoofing | 5002620 5002519 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
16.0.5461.1001 16.0.5461.1000 |
Maybe | None |
Microsoft Office 2019 for 32-bit editions | Click to Run (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office 2019 for 64-bit editions | Click to Run (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 32-bit editions | Click to Run (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
Microsoft Office LTSC 2021 for 64-bit editions | Click to Run (Security Update) | Important | Spoofing | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
https://aka.ms/OfficeSecurityReleases | No | None |
CVE ID | Acknowledgements |
CVE-2024-38200 | Metin Yunus Kandemir JimSRush with PrivSec Consulting |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-3775
MITRE NVD Issuing CNA: Red Hat, Inc. |
CVE Title: Redhat: CVE-2022-3775 grub2 - Heap based out-of-bounds write when rendering certain Unicode sequences
CVSS: CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Executive Summary: None FAQ: Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. Why is this Redhat CVE included in the Security Update Guide? The vulnerability assigned to this CVE is in Linux shim rhboot/shim, a bootloader designed to support Secure Boot on systems that are running Linux. It is being documented in the Security Update Guide to announce that the latest builds of Windows are no longer vulnerable to this security feature bypass using Linux shim. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Critical | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2022-3775 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | grub2 (CBL-Mariner) | Unknown | Unknown | None | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
2.06-14 | Unknown | None |
Azure Linux 3.0 x64 | grub2 (CBL-Mariner) | Unknown | Unknown | None | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
2.06-14 | Unknown | None |
CBL Mariner 1.0 ARM | grub2 (CBL-Mariner) | Unknown | Unknown | None | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
2.06~rc1-10 | Unknown | None |
CBL Mariner 1.0 x64 | grub2 (CBL-Mariner) | Unknown | Unknown | None | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
2.06~rc1-10 | Unknown | None |
CBL Mariner 2.0 ARM | grub2 (CBL-Mariner) | Unknown | Unknown | None | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
2.06-10 | Unknown | None |
CBL Mariner 2.0 x64 | grub2 (CBL-Mariner) | Unknown | Unknown | None | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
2.06-10 | Unknown | None |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Critical | Remote Code Execution | 5040448 | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Critical | Remote Code Execution | 5040448 | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Critical | Remote Code Execution | 5040427 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Critical | Remote Code Execution | 5040431 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Critical | Remote Code Execution | 5040431 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Critical | Remote Code Execution | 5040442 | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Critical | Remote Code Execution | 5040442 | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Critical | Remote Code Execution | 5040442 | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Critical | Remote Code Execution | 5040442 | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Critical | Remote Code Execution | 5040435 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Critical | Remote Code Execution | 5040435 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2012 | 5041851 (Monthly Rollup) | Critical | Remote Code Execution | 5040485 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Critical | Remote Code Execution | 5040485 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Critical | Remote Code Execution | 5040456 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Critical | Remote Code Execution | 5040456 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Critical | Remote Code Execution | 5040434 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Critical | Remote Code Execution | 5040430 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Critical | Remote Code Execution | 5040437 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Critical | Remote Code Execution | 5040437 |
Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Critical | Remote Code Execution | 5040438 | Base: 7.1 Temporal: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2022-3775 | Bill Demirkapi with Microsoft |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38211
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Executive Summary: None FAQ: According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability? The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site. According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? The user would have to click on a specially crafted URL to be compromised by the attacker. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38211 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Dynamics 365 (on-premises) version 9.1 | 5041557 (Security Update) | Important | Spoofing | None | Base: 8.2 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C |
1.31 | Maybe | None |
CVE ID | Acknowledgements |
CVE-2024-38211 | Michael Boeynaems with Splynter Felix Boulet with Centre gouvernemental de cyberdéfense (CGCD) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38120
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution? This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client. How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38120 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Remote Code Execution | 5040499 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Remote Code Execution | 5040497 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Remote Code Execution | 5040485 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Remote Code Execution | 5040456 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Remote Code Execution | 5040434 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Remote Code Execution | 5040430 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Remote Code Execution | 5040437 |
Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Remote Code Execution | 5040438 | Base: 8.8 Temporal: 7.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38120 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38214
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability? An attacker who successfully exploited the vulnerability could view sensitive information (Confidentiality). While the attacker can not make changes to disclosed information (Integrity) and limit access to the resource (Availability). Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table? The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year. According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? This attack requires a admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38214 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Information Disclosure | 5040499 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Information Disclosure | 5040497 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Information Disclosure | 5040497 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Information Disclosure | 5040485 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Information Disclosure | 5040485 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Information Disclosure | 5040456 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Information Disclosure | 5040456 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Information Disclosure | 5040434 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Information Disclosure | 5040430 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Information Disclosure | 5040437 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Information Disclosure | 5040437 |
Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Information Disclosure | 5040438 | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38214 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38215
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Executive Summary: None FAQ: What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38215 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 7.8 Temporal: 6.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38215 | Ezrakiez with MatrixCup |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38166
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Dynamics 365 Cross-site Scripting Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Executive Summary: An unauthenticated attacker can exploit improper neutralization of input during web page generation in Microsoft Dynamics 365 to spoof over a network by tricking a user to click on a link. FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. This purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    06-Aug-24     Information published. |
Critical | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38166 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Dynamics CRM Service Portal Web Resource | Critical | Spoofing | None | Base: 8.2 Temporal: 7.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-38166 | Jhilakshi |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38206
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Copilot Studio Information Disclosure Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.5/TemporalScore:7.4
Executive Summary: An authenticated attacker can bypass Server-Side Request Forgery (SSRF) protection in Microsoft Copilot Studio to leak sensitive information over a network. FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. This purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    06-Aug-24     Information published. |
Critical | Information Disclosure |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38206 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Copilot Studio | Critical | Information Disclosure | None | Base: 8.5 Temporal: 7.4 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-38206 | Evan Grant with Tenable |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38202
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Update Stack Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.9
Executive Summary: SummaryMicrosoft was notified that an elevation of privilege vulnerability exists in Windows Update, potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of Virtualization Based Security (VBS). However, an attacker attempting to exploit this vulnerability requires additional interaction by a privileged user to be successful. Microsoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE. This CVE will be updated, and customers will be notified when the official mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs. DetailsA security researcher informed Microsoft of an elevation of privilege vulnerability in Windows Update potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of VBS. For exploitation to succeed, an attacker must trick or convince an Administrator or a user with delegated permissions into performing a system restore which inadvertently triggers the vulnerability. Microsoft is developing a security update that will mitigate this vulnerability, but it is not yet available. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. See Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now – Microsoft Security Response Center. Microsoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 7, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section to protect their systems. Recommended ActionsThe following recommendations do not mitigate the vulnerability but can be used to reduce the risk of exploitation until the security update is available.
FAQ: According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability? The attacker must have permissions to access the target's System directory to plant the malicious folder that would be used as part of the exploitation. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability? To successfully exploit this vulnerability, an attacker must convince or trick an administrative user into performing a system restore. Mitigations: None Workarounds: None Revision: 1.0    07-Aug-24     Information published. 1.1    08-Aug-24     Added an additional recommended action option and edited the details of a separate recommended action in the CVE Executive Summary. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | Yes | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38202 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 Version 1607 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1607 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1809 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1809 for ARM64-based Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 1809 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 21H2 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 21H2 for ARM64-based Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 21H2 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 22H2 for 32-bit Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 22H2 for ARM64-based Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 10 Version 22H2 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 11 version 21H2 for ARM64-based Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 11 version 21H2 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 11 Version 22H2 for ARM64-based Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 11 Version 22H2 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 11 Version 23H2 for ARM64-based Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows 11 Version 23H2 for x64-based Systems | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows Server 2016 | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows Server 2016 (Server Core installation) | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows Server 2019 | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows Server 2019 (Server Core installation) | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows Server 2022 | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows Server 2022 (Server Core installation) | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None | |
Windows Server 2022, 23H2 Edition (Server Core installation) | Important | Elevation of Privilege | None | Base: 7.3 Temporal: 6.9 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-38202 | Alon Leviev with SafeBreach |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-38218
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (HTML-based) Memory Corruption Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Executive Summary: None FAQ: What is the version information for this release?
According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution? The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Important | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38218 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Important | Remote Code Execution | None | Base: 8.4 Temporal: 7.3 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
127.0.2651.98 | No | None |
CVE ID | Acknowledgements |
CVE-2024-38218 | Nan Wang(@eternalsakura13) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||||||||||
CVE-2024-38219
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Executive Summary: None FAQ: According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:L). What does that mean for this vulnerability? While we cannot rule out the impact to Confidentiality, Integrity, and Availability, the ability to exploit this vulnerability by itself is limited. An attacker would need to combine this with other vulnerabilities to perform an attack. According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment. What is the version information for this release?
According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability? This vulnerability could lead to a contained execution environment escape. Please refer to AppContainer Isolation for more information. Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Moderate | Remote Code Execution |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38219 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Microsoft Edge (Chromium-based) | Release Notes (Security Update) | Moderate | Remote Code Execution | None | Base: 6.5 Temporal: 5.7 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C |
127.0.2651.98 | No | None |
CVE ID | Acknowledgements |
CVE-2024-38219 | Nan Wang(@eternalsakura13) |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2024-38222
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
CVSS: None Executive Summary: None FAQ: Why is the severity for this CVE rated as Moderate, but the CVSS score is higher than normal? Per our severity guidelines, the amount of user interaction or preconditions required to allow this sort of exploitation downgraded the severity, specifically it says, "If a bug requires more than a click, a key press, or several preconditions, the severity will be downgraded". The CVSS scoring system doesn't allow for this type of nuance. What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Edge WebUI permission. The vulnerability allows an attacker to access a victim's data (for example, microphone and camera) through the victim's Edge WebUI default permission. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38222 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CVE ID | Acknowledgements |
CVE-2024-38222 | Jun Kokatsu |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38223
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows Initial Machine Configuration Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Executive Summary: None FAQ: According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability? To exploit this vulnerability, an attacker needs physical access to the victim's machine. How could an attacker exploit this vulnerability? An unauthenticated attacker can use a specially crafted IMC.hiv file (with the registry configuration that needs to be changed), which could lead to elevation of privilege. What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38223 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows 10 for 32-bit Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 for x64-based Systems | 5041782 (Security Update) | Important | Elevation of Privilege | 5040448 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.10240.20751 | Yes | None |
Windows 10 Version 1607 for 32-bit Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1607 for x64-based Systems | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows 10 Version 1809 for 32-bit Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for ARM64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 1809 for x64-based Systems | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows 10 Version 21H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 21H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19044.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for 32-bit Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for ARM64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 10 Version 22H2 for x64-based Systems | 5041580 (Security Update) | Important | Elevation of Privilege | 5040427 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.19045.4780 |
Yes | 5041580 |
Windows 11 version 21H2 for ARM64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 version 21H2 for x64-based Systems | 5041592 (Security Update) | Important | Elevation of Privilege | 5040431 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22000.3147 |
Yes | 5041592 |
Windows 11 Version 22H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 22H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22621.4037 | Yes | None |
Windows 11 Version 23H2 for ARM64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 23H2 for x64-based Systems | 5041585 (Security Update) | Important | Elevation of Privilege | 5040442 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.22631.4037 | Yes | None |
Windows 11 Version 24H2 for ARM64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows 11 Version 24H2 for x64-based Systems | 5041571 (Security Update) | Important | Elevation of Privilege | 5040435 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.26100.1457 |
Yes | 5041571 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Elevation of Privilege | 5040456 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Elevation of Privilege | 5040434 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Elevation of Privilege | 5040430 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Elevation of Privilege | 5040437 |
Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Elevation of Privilege | 5040438 | Base: 6.8 Temporal: 5.9 Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-38223 | Anonymous |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-38109
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Azure Health Bot Elevation of Privilege Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:9.1/TemporalScore:7.9
Executive Summary: An authenticated attacker can exploit an Server-Side Request Forgery (SSRF) vulnerability in Microsoft Azure Health Bot to elevate privileges over a network. FAQ: Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability? This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. This purpose of this CVE is to provide further transparency. Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information. Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Critical | Elevation of Privilege |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-38109 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Health Bot | Critical | Elevation of Privilege | None | Base: 9.1 Temporal: 7.9 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-38109 | Jimi Sebree with Tenable |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||||||||
CVE-2024-37968
MITRE NVD Issuing CNA: Microsoft |
CVE Title: Windows DNS Spoofing Vulnerability
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    13-Aug-24     Information published. |
Important | Spoofing |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Exploitation Less Likely | No | No |
The following tables list the affected software details for the vulnerability.
CVE-2024-37968 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Windows Server 2008 for 32-bit Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Spoofing | 5040499 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Spoofing | 5040499 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Spoofing | 5040499 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | 5041850 (Monthly Rollup) 5041847 (Security Only) |
Important | Spoofing | 5040499 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
6.0.6003.22825 |
Yes | 5041850 5041847 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Spoofing | 5040497 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | 5041838 (Monthly Rollup) 5041823 (Security Only) |
Important | Spoofing | 5040497 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
6.1.7601.27277 | Yes | None |
Windows Server 2012 | 5041851 (Monthly Rollup) | Important | Spoofing | 5040485 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 (Server Core installation) | 5041851 (Monthly Rollup) | Important | Spoofing | 5040485 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
6.2.9200.25031 |
Yes | 5041851 |
Windows Server 2012 R2 | 5041828 (Monthly Rollup) | Important | Spoofing | 5040456 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2012 R2 (Server Core installation) | 5041828 (Monthly Rollup) | Important | Spoofing | 5040456 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
6.3.9600.22134 |
Yes | 5041828 |
Windows Server 2016 | 5041773 (Security Update) | Important | Spoofing | 5040434 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2016 (Server Core installation) | 5041773 (Security Update) | Important | Spoofing | 5040434 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
10.0.14393.7259 |
Yes | 5041773 |
Windows Server 2019 | 5041578 (Security Update) | Important | Spoofing | 5040430 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2019 (Server Core installation) | 5041578 (Security Update) | Important | Spoofing | 5040430 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
10.0.17763.6189 |
Yes | 5041578 |
Windows Server 2022 | 5041160 (Security Update) | Important | Spoofing | 5040437 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022 (Server Core installation) | 5041160 (Security Update) | Important | Spoofing | 5040437 |
Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
10.0.20348.2655 |
Yes | 5041160 |
Windows Server 2022, 23H2 Edition (Server Core installation) | 5041573 (Security Update) | Important | Spoofing | 5040438 | Base: 7.5 Temporal: 6.7 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C |
10.0.25398.1085 | Yes | None |
CVE ID | Acknowledgements |
CVE-2024-37968 | Yunyi Zhang with NUDT |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-36648
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:10.0/TemporalScore:10.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-36648 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 10.0 Temporal: 10.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 10.0 Temporal: 10.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 10.0 Temporal: 10.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
6.2.0-17 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 10.0 Temporal: 10.0 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
6.2.0-17 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-36648 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2007-4559
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    25-Sep-20     Information published. 2.0    16-Dec-21     Added python3 to CBL-Mariner 2.0 1.0    30-Jun-24     Information published. 1.0    08-Jul-24     Information published. 1.0    09-Jul-24     Information published. 1.0    10-Jul-24     Information published. 1.0    12-Jul-24     Information published. 1.0    13-Jul-24     Information published. 1.0    14-Jul-24     Information published. 1.0    15-Jul-24     Information published. 1.0    16-Jul-24     Information published. 1.0    17-Jul-24     Information published. 1.0    19-Jul-24     Information published. 1.0    20-Jul-24     Information published. 1.0    21-Jul-24     Information published. 1.0    22-Jul-24     Information published. 1.0    23-Jul-24     Information published. 1.0    24-Jul-24     Information published. 1.0    25-Jul-24     Information published. 1.0    26-Jul-24     Information published. 1.0    27-Jul-24     Information published. 1.0    28-Jul-24     Information published. 1.0    29-Jul-24     Information published. 1.0    02-Aug-24     Information published. 1.0    03-Aug-24     Information published. 1.0    04-Aug-24     Information published. 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2007-4559 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 1.0 ARM | python2 (CBL-Mariner) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
2.7.18-5 | Unknown | None |
CBL Mariner 1.0 x64 | python2 (CBL-Mariner) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
2.7.18-5 | Unknown | None |
CBL Mariner 2.0 ARM | python3 (CBL-Mariner) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
3.9.19-1 | Unknown | None |
CBL Mariner 2.0 x64 | python3 (CBL-Mariner) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
3.9.19-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2007-4559 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2019-9674
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    18-Aug-20     Information published. 1.0    30-Jun-24     Information published. 1.0    08-Jul-24     Information published. 1.0    09-Jul-24     Information published. 1.0    10-Jul-24     Information published. 1.0    12-Jul-24     Information published. 1.0    13-Jul-24     Information published. 1.0    14-Jul-24     Information published. 1.0    15-Jul-24     Information published. 1.0    16-Jul-24     Information published. 1.0    17-Jul-24     Information published. 1.0    19-Jul-24     Information published. 1.0    20-Jul-24     Information published. 1.0    21-Jul-24     Information published. 1.0    22-Jul-24     Information published. 1.0    23-Jul-24     Information published. 1.0    24-Jul-24     Information published. 1.0    25-Jul-24     Information published. 1.0    26-Jul-24     Information published. 1.0    27-Jul-24     Information published. 1.0    28-Jul-24     Information published. 1.0    29-Jul-24     Information published. 1.0    02-Aug-24     Information published. 1.0    03-Aug-24     Information published. 1.0    04-Aug-24     Information published. 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2019-9674 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 1.0 ARM | python2 (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.7.18-5 | Unknown | None |
CBL Mariner 1.0 x64 | python2 (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.7.18-5 | Unknown | None |
CBL Mariner 2.0 ARM | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 x64 | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2019-9674 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2019-3833
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Apr-24     Information published. 1.0    30-Jun-24     Information published. 1.0    08-Jul-24     Information published. 1.0    09-Jul-24     Information published. 1.0    10-Jul-24     Information published. 1.0    12-Jul-24     Information published. 1.0    13-Jul-24     Information published. 1.0    14-Jul-24     Information published. 1.0    15-Jul-24     Information published. 1.0    16-Jul-24     Information published. 1.0    17-Jul-24     Information published. 1.0    19-Jul-24     Information published. 1.0    20-Jul-24     Information published. 1.0    21-Jul-24     Information published. 1.0    22-Jul-24     Information published. 1.0    23-Jul-24     Information published. 1.0    24-Jul-24     Information published. 1.0    25-Jul-24     Information published. 1.0    26-Jul-24     Information published. 1.0    27-Jul-24     Information published. 1.0    28-Jul-24     Information published. 1.0    29-Jul-24     Information published. 1.0    02-Aug-24     Information published. 1.0    03-Aug-24     Information published. 1.0    04-Aug-24     Information published. 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2019-3833 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | openwsman (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.6.8-13 | Unknown | None |
CBL Mariner 2.0 x64 | openwsman (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.6.8-13 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2019-3833 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-6655
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-6655 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | gtk2 (CBL-Mariner) gtk3 (CBL-Mariner) |
Unknown | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.24.32-12 3.24.28-10 |
None | ||
CBL Mariner 2.0 x64 | gtk2 (CBL-Mariner) gtk3 (CBL-Mariner) |
Unknown | Unknown | Base: 7.0 Temporal: 7.0 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.24.32-12 3.24.28-10 |
None |
CVE ID | Acknowledgements |
CVE-2024-6655 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2024-2466
MITRE NVD Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9 |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-2466 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | curl (CBL-Mariner) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
8.8.0-1 | Unknown | None |
CBL Mariner 2.0 x64 | curl (CBL-Mariner) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
8.8.0-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-2466 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39331
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39331 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | emacs (CBL-Mariner) | Unknown | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
29.4-1 | Unknown | None |
CBL Mariner 2.0 x64 | emacs (CBL-Mariner) | Unknown | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
29.4-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39331 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2021-43565
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    23-Jul-24     Information published. 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2021-43565 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | cf-cli (CBL-Mariner) cri-o (CBL-Mariner) gh (CBL-Mariner) moby-buildx (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
8.4.0-18 1.22.3-5 2.13.0-19 0.7.1-20 |
None | ||
CBL Mariner 2.0 x64 | cf-cli (CBL-Mariner) cri-o (CBL-Mariner) gh (CBL-Mariner) moby-buildx (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
8.4.0-18 1.22.3-5 2.13.0-19 0.7.1-20 |
None |
CVE ID | Acknowledgements |
CVE-2021-43565 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39277
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39277 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39277 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-38780
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-38780 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-38780 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39292
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39292 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39292 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39482
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39482 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39482 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39484
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39484 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39484 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39495
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39495 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39495 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-40902
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-40902 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-40902 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-41110
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:9.9/TemporalScore:9.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-41110 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | moby-engine (CBL-Mariner) | Unknown | Unknown | None | Base: 9.9 Temporal: 9.9 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
24.0.9-7 | Unknown | None |
CBL Mariner 2.0 x64 | moby-engine (CBL-Mariner) | Unknown | Unknown | None | Base: 9.9 Temporal: 9.9 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
24.0.9-7 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-41110 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-37298
MITRE NVD Issuing CNA: security-advisories@github.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    19-Jul-24     Information published. 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-37298 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | libcontainers-common (CBL-Mariner) telegraf (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
20210626-4 1.29.4-7 |
None | ||
CBL Mariner 2.0 x64 | libcontainers-common (CBL-Mariner) telegraf (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
20210626-4 1.29.4-7 |
None |
CVE ID | Acknowledgements |
CVE-2024-37298 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-0397
MITRE NVD Issuing CNA: cna@python.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.4/TemporalScore:7.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-0397 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | python3 (CBL-Mariner) | Unknown | Unknown | None | Base: 7.4 Temporal: 7.4 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H |
3.9.19-3 | Unknown | None |
CBL Mariner 2.0 x64 | python3 (CBL-Mariner) | Unknown | Unknown | None | Base: 7.4 Temporal: 7.4 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H |
3.9.19-3 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-0397 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2021-3929
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:8.2/TemporalScore:8.2
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2021-3929 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
6.2.0-13 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
6.2.0-13 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2021-3929 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2021-4158
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.0/TemporalScore:6.0
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2021-4158 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 6.0 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 6.0 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 6.0 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H |
6.2.0-7 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 6.0 Temporal: 6.0 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H |
6.2.0-7 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2021-4158 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2021-4206
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:8.2/TemporalScore:8.2
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2021-4206 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
CBL Mariner 1.0 ARM | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
4.2.0-41 | Unknown | None |
CBL Mariner 1.0 x64 | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
4.2.0-41 | Unknown | None |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
6.2.0-4 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
6.2.0-4 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2021-4206 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2021-4207
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:8.2/TemporalScore:8.2
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2021-4207 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
CBL Mariner 1.0 ARM | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
4.2.0-48 | Unknown | None |
CBL Mariner 1.0 x64 | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
4.2.0-48 | Unknown | None |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
6.2.0-13 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
6.2.0-13 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2021-4207 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-26353
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-26353 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
6.2.0-3 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
6.2.0-3 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-26353 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-35414
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-35414 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 8.8 Temporal: 8.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 8.8 Temporal: 8.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
CBL Mariner 1.0 ARM | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 8.8 Temporal: 8.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
4.2.0-43 | Unknown | None |
CBL Mariner 1.0 x64 | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 8.8 Temporal: 8.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
4.2.0-43 | Unknown | None |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 8.8 Temporal: 8.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
6.2.0-7 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 8.8 Temporal: 8.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
6.2.0-7 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-35414 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-3354
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-3354 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
6.2.0-19 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
6.2.0-19 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2023-3354 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-3872
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:8.6/TemporalScore:8.6
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-3872 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
Unknown | Unknown | None | |
CBL Mariner 1.0 ARM | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
4.2.0-48 | Unknown | None |
CBL Mariner 1.0 x64 | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
4.2.0-48 | Unknown | None |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
6.2.0-12 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
6.2.0-12 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-3872 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-4144
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-4144 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H |
6.2.0-12 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H |
6.2.0-12 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-4144 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2023-45288
MITRE NVD Issuing CNA: security@golang.org |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Apr-24     Information published. 1.0    20-Apr-24     Information published. 1.0    30-Jun-24     Information published. 1.0    02-Jul-24     Information published. 1.0    12-Jul-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-45288 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | docker-buildx (CBL-Mariner) docker-compose (CBL-Mariner) ig (CBL-Mariner) kubernetes (CBL-Mariner) |
Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
0.14.0-1 2.27.0-1 0.29.0-1 1.30.1-1 |
None | ||
Azure Linux 3.0 x64 | docker-buildx (CBL-Mariner) docker-compose (CBL-Mariner) ig (CBL-Mariner) kubernetes (CBL-Mariner) |
Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
0.14.0-1 2.27.0-1 0.29.0-1 1.30.1-1 |
None | ||
CBL Mariner 2.0 ARM | blobfuse2 (CBL-Mariner) cert-manager (CBL-Mariner) coredns (CBL-Mariner) cri-tools (CBL-Mariner) |
Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
2.1.2-3 1.11.2-9 1.11.1-8 1.29.0-2 |
None | ||
CBL Mariner 2.0 x64 | blobfuse2 (CBL-Mariner) cert-manager (CBL-Mariner) coredns (CBL-Mariner) cri-tools (CBL-Mariner) |
Unknown | Unknown | Base: N/A Temporal: N/A Vector: N/A |
2.1.2-3 1.11.2-9 1.11.1-8 1.29.0-2 |
None |
CVE ID | Acknowledgements |
CVE-2023-45288 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-38571
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-38571 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-38571 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42077
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42077 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42077 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-29404
MITRE NVD Issuing CNA: security@golang.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    14-Jun-23     Information published. 1.0    09-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-29404 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | golang (CBL-Mariner) | Unknown | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
1.22.6-1 | Unknown | None |
Azure Linux 3.0 x64 | golang (CBL-Mariner) | Unknown | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
1.22.6-1 | Unknown | None |
CBL Mariner 2.0 ARM | msft-golang (CBL-Mariner) | Unknown | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
1.19.10-1 | Unknown | None |
CBL Mariner 2.0 x64 | msft-golang (CBL-Mariner) | Unknown | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
1.19.10-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2023-29404 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-29402
MITRE NVD Issuing CNA: security@golang.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    12-Jun-23     Information published. 1.0    09-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-29402 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | golang (CBL-Mariner) | Unknown | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
1.22.6-1 | Unknown | None |
Azure Linux 3.0 x64 | golang (CBL-Mariner) | Unknown | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
1.22.6-1 | Unknown | None |
CBL Mariner 2.0 ARM | msft-golang (CBL-Mariner) | Unknown | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
1.19.10-1 | Unknown | None |
CBL Mariner 2.0 x64 | msft-golang (CBL-Mariner) | Unknown | Unknown | None | Base: 9.8 Temporal: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
1.19.10-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2023-29402 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39473
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39473 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39473 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-26900
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-26900 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.159.1-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.159.1-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-26900 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39474
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39474 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39474 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42073
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42073 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42073 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42074
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42074 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42074 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42075
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42075 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42075 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42078
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42078 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42078 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2017-18207
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    18-Aug-20     Information published. 1.0    30-Jun-24     Information published. 1.0    08-Jul-24     Information published. 1.0    09-Jul-24     Information published. 1.0    10-Jul-24     Information published. 1.0    12-Jul-24     Information published. 1.0    13-Jul-24     Information published. 1.0    14-Jul-24     Information published. 1.0    15-Jul-24     Information published. 1.0    16-Jul-24     Information published. 1.0    17-Jul-24     Information published. 1.0    19-Jul-24     Information published. 1.0    20-Jul-24     Information published. 1.0    21-Jul-24     Information published. 1.0    22-Jul-24     Information published. 1.0    23-Jul-24     Information published. 1.0    24-Jul-24     Information published. 1.0    25-Jul-24     Information published. 1.0    26-Jul-24     Information published. 1.0    27-Jul-24     Information published. 1.0    28-Jul-24     Information published. 1.0    29-Jul-24     Information published. 1.0    02-Aug-24     Information published. 1.0    03-Aug-24     Information published. 1.0    04-Aug-24     Information published. 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2017-18207 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 1.0 ARM | python2 (CBL-Mariner) | Unknown | Unknown | None | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.7.18-5 | Unknown | None |
CBL Mariner 1.0 x64 | python2 (CBL-Mariner) | Unknown | Unknown | None | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
2.7.18-5 | Unknown | None |
CBL Mariner 2.0 ARM | Unknown | Unknown | None | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 x64 | Unknown | Unknown | None | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2017-18207 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2019-3816
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    02-Apr-24     Information published. 1.0    30-Jun-24     Information published. 1.0    02-Jul-24     Information published. 1.0    03-Jul-24     Information published. 1.0    04-Jul-24     Information published. 1.0    05-Jul-24     Information published. 1.0    06-Jul-24     Information published. 1.0    08-Jul-24     Information published. 1.0    09-Jul-24     Information published. 1.0    10-Jul-24     Information published. 1.0    12-Jul-24     Information published. 1.0    13-Jul-24     Information published. 1.0    14-Jul-24     Information published. 1.0    15-Jul-24     Information published. 1.0    16-Jul-24     Information published. 1.0    17-Jul-24     Information published. 1.0    19-Jul-24     Information published. 1.0    20-Jul-24     Information published. 1.0    21-Jul-24     Information published. 1.0    22-Jul-24     Information published. 1.0    23-Jul-24     Information published. 1.0    24-Jul-24     Information published. 1.0    25-Jul-24     Information published. 1.0    26-Jul-24     Information published. 1.0    27-Jul-24     Information published. 1.0    28-Jul-24     Information published. 1.0    29-Jul-24     Information published. 1.0    02-Aug-24     Information published. 1.0    03-Aug-24     Information published. 1.0    04-Aug-24     Information published. 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2019-3816 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | openwsman (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.6.8-13 | Unknown | None |
CBL Mariner 2.0 x64 | openwsman (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.6.8-13 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2019-3816 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2019-20907
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    18-Aug-20     Information published. 1.0    30-Jun-24     Information published. 1.0    08-Jul-24     Information published. 1.0    09-Jul-24     Information published. 1.0    10-Jul-24     Information published. 1.0    12-Jul-24     Information published. 1.0    13-Jul-24     Information published. 1.0    14-Jul-24     Information published. 1.0    15-Jul-24     Information published. 1.0    16-Jul-24     Information published. 1.0    17-Jul-24     Information published. 1.0    19-Jul-24     Information published. 1.0    20-Jul-24     Information published. 1.0    21-Jul-24     Information published. 1.0    22-Jul-24     Information published. 1.0    23-Jul-24     Information published. 1.0    24-Jul-24     Information published. 1.0    25-Jul-24     Information published. 1.0    26-Jul-24     Information published. 1.0    27-Jul-24     Information published. 1.0    28-Jul-24     Information published. 1.0    29-Jul-24     Information published. 1.0    02-Aug-24     Information published. 1.0    03-Aug-24     Information published. 1.0    04-Aug-24     Information published. 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2019-20907 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 1.0 ARM | python2 (CBL-Mariner) python3 (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.7.18-5 3.7.10-3 |
None | ||
CBL Mariner 1.0 x64 | python2 (CBL-Mariner) python3 (CBL-Mariner) |
Unknown | Unknown | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.7.18-5 3.7.10-3 |
None | ||
CBL Mariner 2.0 ARM | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 x64 | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2019-20907 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2021-23336
MITRE NVD Issuing CNA: report@snyk.io |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    27-Feb-21     Information published. 1.0    30-Jun-24     Information published. 1.0    08-Jul-24     Information published. 1.0    09-Jul-24     Information published. 1.0    10-Jul-24     Information published. 1.0    12-Jul-24     Information published. 1.0    13-Jul-24     Information published. 1.0    14-Jul-24     Information published. 1.0    15-Jul-24     Information published. 1.0    16-Jul-24     Information published. 1.0    17-Jul-24     Information published. 1.0    19-Jul-24     Information published. 1.0    20-Jul-24     Information published. 1.0    21-Jul-24     Information published. 1.0    22-Jul-24     Information published. 1.0    23-Jul-24     Information published. 1.0    24-Jul-24     Information published. 1.0    25-Jul-24     Information published. 1.0    26-Jul-24     Information published. 1.0    27-Jul-24     Information published. 1.0    28-Jul-24     Information published. 1.0    29-Jul-24     Information published. 1.0    02-Aug-24     Information published. 1.0    03-Aug-24     Information published. 1.0    04-Aug-24     Information published. 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2021-23336 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 1.0 ARM | python2 (CBL-Mariner) python3 (CBL-Mariner) |
Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H |
2.7.18-6 3.7.10-3 |
None | ||
CBL Mariner 1.0 x64 | python2 (CBL-Mariner) python3 (CBL-Mariner) |
Unknown | Unknown | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H |
2.7.18-6 3.7.10-3 |
None | ||
CBL Mariner 2.0 ARM | Unknown | Unknown | None | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 x64 | Unknown | Unknown | None | Base: 5.9 Temporal: 5.9 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2021-23336 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2017-17522
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    18-Aug-20     Information published. 1.0    30-Jun-24     Information published. 1.0    08-Jul-24     Information published. 1.0    09-Jul-24     Information published. 1.0    10-Jul-24     Information published. 1.0    12-Jul-24     Information published. 1.0    13-Jul-24     Information published. 1.0    14-Jul-24     Information published. 1.0    15-Jul-24     Information published. 1.0    16-Jul-24     Information published. 1.0    17-Jul-24     Information published. 1.0    19-Jul-24     Information published. 1.0    20-Jul-24     Information published. 1.0    21-Jul-24     Information published. 1.0    22-Jul-24     Information published. 1.0    23-Jul-24     Information published. 1.0    24-Jul-24     Information published. 1.0    25-Jul-24     Information published. 1.0    26-Jul-24     Information published. 1.0    27-Jul-24     Information published. 1.0    28-Jul-24     Information published. 1.0    29-Jul-24     Information published. 1.0    02-Aug-24     Information published. 1.0    03-Aug-24     Information published. 1.0    04-Aug-24     Information published. 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2017-17522 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 1.0 ARM | python2 (CBL-Mariner) | Unknown | Unknown | None | Base: 8.8 Temporal: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.7.18-3 | Unknown | None |
CBL Mariner 1.0 x64 | python2 (CBL-Mariner) | Unknown | Unknown | None | Base: 8.8 Temporal: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.7.18-3 | Unknown | None |
CBL Mariner 2.0 ARM | Unknown | Unknown | None | Base: 8.8 Temporal: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 x64 | Unknown | Unknown | None | Base: 8.8 Temporal: 8.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
Unknown | Unknown | None |
CVE ID | Acknowledgements |
CVE-2017-17522 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-0853
MITRE NVD Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-0853 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | curl (CBL-Mariner) | Unknown | Unknown | None | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
8.8.0-1 | Unknown | None |
CBL Mariner 2.0 x64 | curl (CBL-Mariner) | Unknown | Unknown | None | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
8.8.0-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-0853 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-2004
MITRE NVD Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:3.5/TemporalScore:3.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-2004 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | curl (CBL-Mariner) | Unknown | Unknown | None | Base: 3.5 Temporal: 3.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N |
8.8.0-1 | Unknown | None |
CBL Mariner 2.0 x64 | curl (CBL-Mariner) | Unknown | Unknown | None | Base: 3.5 Temporal: 3.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N |
8.8.0-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-2004 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-2398
MITRE NVD Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:8.6/TemporalScore:8.6
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-2398 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | curl (CBL-Mariner) | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L |
8.8.0-1 | Unknown | None |
CBL Mariner 2.0 x64 | curl (CBL-Mariner) | Unknown | Unknown | None | Base: 8.6 Temporal: 8.6 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L |
8.8.0-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-2398 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-38662
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-38662 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 4.7 Temporal: 4.7 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 4.7 Temporal: 4.7 Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-38662 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-36288
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-36288 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-36288 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39480
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39480 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39480 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39476
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39476 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39476 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39475
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39475 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39475 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2024-37371
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-37371 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | krb5 (CBL-Mariner) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
1.21.3-1 | Unknown | None |
CBL Mariner 2.0 x64 | krb5 (CBL-Mariner) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
1.21.3-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-37371 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2024-26461
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-26461 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | krb5 (CBL-Mariner) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
1.21.3-1 | Unknown | None |
CBL Mariner 2.0 x64 | krb5 (CBL-Mariner) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
1.21.3-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-26461 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact |
CVE-2024-37370
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: None Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-37370 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | krb5 (CBL-Mariner) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
1.21.3-1 | Unknown | None |
CBL Mariner 2.0 x64 | krb5 (CBL-Mariner) | Unknown | Unknown | None | Base: N/A Temporal: N/A Vector: N/A |
1.21.3-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-37370 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-6104
MITRE NVD Issuing CNA: security@hashicorp.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-6104 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | skopeo (CBL-Mariner) terraform (CBL-Mariner) |
Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.14.2-7 1.3.2-17 |
None | ||
CBL Mariner 2.0 x64 | skopeo (CBL-Mariner) terraform (CBL-Mariner) |
Unknown | Unknown | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
1.14.2-7 1.3.2-17 |
None |
CVE ID | Acknowledgements |
CVE-2024-6104 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-6257
MITRE NVD Issuing CNA: security@hashicorp.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:8.4/TemporalScore:8.4
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-6257 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | terraform (CBL-Mariner) | Unknown | Unknown | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H |
1.3.2-17 | Unknown | None |
CBL Mariner 2.0 x64 | terraform (CBL-Mariner) | Unknown | Unknown | None | Base: 8.4 Temporal: 8.4 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H |
1.3.2-17 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-6257 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2021-3750
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:8.2/TemporalScore:8.2
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    17-May-22     Information published. 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2021-3750 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
Unknown | Unknown | None | |
CBL Mariner 1.0 ARM | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
4.2.0-41 | Unknown | None |
CBL Mariner 1.0 x64 | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
4.2.0-41 | Unknown | None |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
6.2.0-16 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 8.2 Temporal: 8.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H |
6.2.0-16 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2021-3750 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-0358
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-0358 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
CBL Mariner 1.0 ARM | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
4.2.0-48 | Unknown | None |
CBL Mariner 1.0 x64 | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
4.2.0-48 | Unknown | None |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
6.2.0-5 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
6.2.0-5 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-0358 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-26354
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:3.2/TemporalScore:3.2
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-26354 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 3.2 Temporal: 3.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 3.2 Temporal: 3.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L |
Unknown | Unknown | None | |
CBL Mariner 1.0 ARM | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 3.2 Temporal: 3.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L |
4.2.0-48 | Unknown | None |
CBL Mariner 1.0 x64 | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 3.2 Temporal: 3.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L |
4.2.0-48 | Unknown | None |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 3.2 Temporal: 3.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L |
6.2.0-2 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 3.2 Temporal: 3.2 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L |
6.2.0-2 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-26354 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-3165
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-3165 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Unknown | Unknown | None | |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.2.0-15 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 6.5 Temporal: 6.5 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
6.2.0-15 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-3165 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-2962
MITRE NVD Issuing CNA: secalert@redhat.com |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    05-Aug-24     Information published. 1.0    06-Aug-24     Information published. 1.0    07-Aug-24     Information published. 1.0    08-Aug-24     Information published. 1.0    09-Aug-24     Information published. 1.0    10-Aug-24     Information published. 1.0    11-Aug-24     Information published. 1.0    12-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-2962 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
Azure Linux 3.0 x64 | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Unknown | Unknown | None | |
CBL Mariner 1.0 ARM | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
4.2.0-48 | Unknown | None |
CBL Mariner 1.0 x64 | qemu-kvm (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
4.2.0-48 | Unknown | None |
CBL Mariner 2.0 ARM | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
6.2.0-13 | Unknown | None |
CBL Mariner 2.0 x64 | qemu (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
6.2.0-13 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-2962 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-23722
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    01-Apr-24     Information published. 1.0    06-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-23722 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | fluent-bit (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.2.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | fluent-bit (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.2.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-23722 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-40898
MITRE NVD Issuing CNA: security@apache.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    26-Jul-24     Information published. 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-40898 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | httpd (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.4.62-1 | Unknown | None |
CBL Mariner 2.0 x64 | httpd (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
2.4.62-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-40898 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-38583
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-38583 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-38583 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39493
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39493 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39493 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42068
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42068 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42068 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39489
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39489 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39489 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42070
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42070 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42070 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42076
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42076 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42076 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42080
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42080 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42080 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-38428
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:9.1/TemporalScore:9.1
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    30-Jun-24     Information published. 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-38428 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | wget (CBL-Mariner) | Unknown | Unknown | None | Base: 9.1 Temporal: 9.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
1.21.2-3 | Unknown | None |
CBL Mariner 2.0 x64 | wget (CBL-Mariner) | Unknown | Unknown | None | Base: 9.1 Temporal: 9.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N |
1.21.2-3 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-38428 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42082
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42082 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42082 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-41722
MITRE NVD Issuing CNA: security@golang.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    01-Mar-23     Information published. 1.0    09-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-41722 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | golang (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
1.22.6-1 | Unknown | None |
Azure Linux 3.0 x64 | golang (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
1.22.6-1 | Unknown | None |
CBL Mariner 2.0 ARM | msft-golang (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
1.19.8-1 | Unknown | None |
CBL Mariner 2.0 x64 | msft-golang (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
1.19.8-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-41722 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-29526
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    08-Nov-23     Information published. 2.0    24-Jan-24     Added nmi to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0 3.0    11-Apr-24     Added cri-o to CBL-Mariner 2.0 1.0    30-Jun-24     Information published. 1.0    09-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-29526 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
Azure Linux 3.0 ARM | golang (CBL-Mariner) keda (CBL-Mariner) moby-engine (CBL-Mariner) node-problem-detector (CBL-Mariner) |
Unknown | Unknown | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
1.22.6-1 2.14.0-1 25.0.3-1 0.8.15-1 |
None | ||
Azure Linux 3.0 x64 | golang (CBL-Mariner) keda (CBL-Mariner) moby-engine (CBL-Mariner) node-problem-detector (CBL-Mariner) |
Unknown | Unknown | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
1.22.6-1 2.14.0-1 25.0.3-1 0.8.15-1 |
None | ||
CBL Mariner 2.0 ARM | azcopy (CBL-Mariner) cri-o (CBL-Mariner) git-lfs (CBL-Mariner) kata-containers (CBL-Mariner) |
Unknown | Unknown | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
10.24.0-1 1.21.7-2 3.4.1-1 3.2.0.azl2-1 |
None | ||
CBL Mariner 2.0 x64 | azcopy (CBL-Mariner) cri-o (CBL-Mariner) git-lfs (CBL-Mariner) kata-containers (CBL-Mariner) |
Unknown | Unknown | Base: 5.3 Temporal: 5.3 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
10.24.0-1 1.21.7-2 3.4.1-1 3.2.0.azl2-1 |
None |
CVE ID | Acknowledgements |
CVE-2022-29526 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-48788
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-48788 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-48788 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2023-52340
MITRE NVD Issuing CNA: cve@mitre.org |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2023-52340 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.5 Temporal: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2023-52340 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2022-48841
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2022-48841 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2022-48841 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39485
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39485 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39485 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-39483
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-39483 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-39483 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42071
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42071 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42071 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42072
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42072 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 7.8 Temporal: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42072 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42237
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42237 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42237 | None |
CVE ID | Vulnerability Description | Maximum Severity Rating | Vulnerability Impact | ||||||||||||||||||||||||||||||
CVE-2024-42083
MITRE NVD Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67 |
CVE Title: Unknown
CVSS: CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Executive Summary: None FAQ: None Mitigations: None Workarounds: None Revision: 1.0    10-Aug-24     Information published. |
Unknown | Unknown |
The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.
Exploitability Assessment | Publicly Disclosed | Exploited |
Not Found | Not Found | Not Found |
The following tables list the affected software details for the vulnerability.
CVE-2024-42083 | ||||||||
Product | KB Article | Severity | Impact | Supercedence | CVSS Score Set | Fixed Build | Restart Required | Known Issue |
CBL Mariner 2.0 ARM | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CBL Mariner 2.0 x64 | kernel (CBL-Mariner) | Unknown | Unknown | None | Base: 5.5 Temporal: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
5.15.162.2-1 | Unknown | None |
CVE ID | Acknowledgements |
CVE-2024-42083 | None |